Illegal Mobile Phone Porting

Mobile number fraud, or illegal mobile phone porting, occurs when someone steals your personal information to transfer your mobile number to them without your consent.

Your stolen mobile number can then be used to receive SMS codes, allowing the scammer to gain access to services such as your bank, email and social media accounts and other services.

How can a Mobile Number be Transferred and Stolen Without my Consent?

After illegally obtaining your personal information, scammers may steal mobile numbers by:

  • An unauthorised mobile number port: the scammer contacts a different phone company and pretends to be you, sets up an account and ports your number.
  • A SIM Swap: the scammer contacts your existing phone company pretending to be you and requests a new SIM card that contains your number for use on their device.

How can I Tell if my Mobile Number has been Stolen?

If you unexpectedly find that you have lost phone coverage or reception on your mobile phone service, it is possible that your mobile number has been stolen.

Signs may include:

  • You are unable to make or receive calls or messages when you usually can
  • Your mobile phone is showing ‘SOS only’, where reception bars usually appear.

If you’re unsure, contact your phone company to check your account or whether any mobile network-related incidents may have caused the loss of service.

What should I do if my Mobile Number has been Stolen?

Contact your mobile phone company and check whether your number was ported or transferred without your consent.

  • If your number was ported to another phone company, request a reversal of the port.
  • If a SIM swap has occurred, ask your phone company to deactivate the SIM card and provide you with a replacement.
  • Contact your bank urgently to alert it to the possibility of fraudulent activity. You may also consider changing your bank passwords.
  • Check your social media accounts for unusual activity and change your passwords.
  • Report any fraud to local police.

Report any cybercrime relating to identity theft and online fraud to the Australian Cybercrime Online Reporting Network.

Contact IDCARE on 1300 432 273 for support and free assistance for identity crime and cyber-related security.

What can you do to Protect Yourself?

  1. Ask your mobile provider and your bank to set up a secret pin number or password that only you know to identify yourself when you call them
    or deal with them in person.
  2. Check your social media profiles on Facebook, Twitter and LinkedIn to ensure your mobile number is hidden from public viewing (remember to
    check resumes and work documents that are available online). Also, find out if your mobile number is listed online anywhere and have it
    taken down. You can do this by Googling your mobile number
  3. Remove your birth date from public view on social media. Use a fake birthdate when you sign up. Do not use real personal information for
    security questions; make up a best friends name or mother’s maiden name. Remember a scammer can work out your birth date from photos of
    birthday celebrations, or a happy birthday message from a friend.
  4. Create strong passwords for your online accounts and use different passwords for different accounts. If you have lots of online accounts,
    consider using a password manager.
  5. Wherever possible, use multi-factor authentication (MFA) to login to your online accounts. MFA is when you need to input a time limited
    verification code that before you can log in to an account.
  6. Scammers can gain personal information about you by stealing your physical mail. Make sure you have a lock on your physical letter box,
    and keep your home street address offline. Google your address alongside your name to see if it is listed anywhere.
  7. Be security conscious on Facebook and online generally. Do not list your family’s names online anywhere; if you have connected them in
    your Facebook profile hide or delete these links. Hide your friends list from public and friends’ view. If a scammer can see your friends
    list, they can then copy your Facebook profile to impersonate you, and then approach them using a fake profile. Never accept a friend request from someone you are already friends with on Facebook as it may be a fake profile.

The Rules

The Telecommunications Consumer Protections Code (TCP Code) sets out the obligations on phone companies to get your consent and ensure any transfer request is from your or an authorised
representative.

The Mobile Number Portability Code (MNP Code) sets out the processes phone companies must follow when porting your mobile number from one phone company to another.

The Telecommunications Numbering Plan 2015 (numbering plan) sets out the rules for number portability.

If you’d like any further information on illegal mobile phone porting, or assistance with your IT support or technology or you don’t know where to start please call us on 1300 478 738 or email us at info@suretyit.com.au.

Read more:

Why Good Cybersecurity is a Positive for Your Business

What to include in a Laptop Security Policy

Contact Us

Name(Required)
This field is for validation purposes and should be left unchanged.

Find out how we can help with your IT challenges.

About the author:

Picture of Ash Klemm

Ash Klemm

Ash has over 20 years of experience in sales and marketing. His journey from a casual salesperson at Chandlers to State Manager at a national IT distribution company, while battling health issues, including a double lung transplant in 2015, gave him the experience, know-how, tenacity, and marketing insight, to find solutions and help businesses grow. After spending several years in the ivory tower of state management, Ash missed the genuine connection of face to face meetings and helping make a difference to businesses in need. His authentic, conversational, and easy-going nature helps our customers feel at ease and shows them we are a brand to trust. Ash spends his days advocating for our customers to ensure they receive the best possible service in a timely fashion. Ash is also the in house chair builder. His curiosity and natural problem-solving ability make him the perfect first call for all our new customers to help determine what is wrong, how Surety IT can help and what the best solutions are moving forward.
Scroll to Top