Tech Talk
Rising SIM Swapping Fraud in the Middle East: Cybercriminals Exploit New Tactics

A surge in SIM swapping fraud across the Middle East is revealing sophisticated new techniques used by cybercriminals to exploit victims, according to a recent report by cybersecurity firm Group-IB. Fraudsters are increasingly relying on phishing websites and social engineering to bypass security measures, allowing them to hijack mobile numbers and gain access to sensitive accounts.
How SIM Swapping Fraud Works
Investigations have uncovered that attackers first steal personal details—such as national IDs and banking information—through fake websites that closely mimic legitimate services. Using this stolen data, they request a SIM swap or port-out, transferring control of the victim’s phone number to themselves.
Once in control, these criminals intercept SMS-based two-factor authentication (2FA) codes, enabling them to authorize fraudulent transactions and gain access to financial accounts.
Exclusive Fraud Risk Management Bootcamp for BFSI Professionals in Lucknow on March 24 – Register Now!
A key trend in these attacks is the rise of phishing websites tailored to exploit regional services. Fraudsters have been found creating fake domains targeting high-demand industries, including car insurance, domestic worker hiring, and government services. By leveraging these local trends, they increase their chances of deceiving victims into entering personal information.
Financial Losses and Growing Risks
A recent case study revealed how a phishing website impersonating an insurance provider led to widespread complaints of SIM deactivations. Further analysis uncovered an extensive network of fraudulent domains operated by a single administrator, all designed to harvest personal data. Many of these domains used bulk registrations and typosquatting techniques to evade detection.
Group-IB reports that financial losses from SIM swapping fraud continue to rise, with 39% of cases involving multiple unauthorized transactions. While losses typically range from $270 to $5,400, some victims have suffered damages exceeding $160,000.
Criminals use compromised SIMs to reset banking credentials, transfer funds to mule accounts, and make fraudulent payments via digital wallets—leaving victims scrambling to regain control over their finances.
How to Protect Against SIM Swapping
As cybercriminals refine their methods, both financial institutions and individuals must take proactive steps to mitigate these risks.
1. For Banks and Telecom Providers:
- Freeze high-risk transactions when a SIM swap is detected and require additional identity verification.
- Utilize behavioral analytics to identify suspicious logins and transactions.
- Strengthen collaboration between banks, telecom operators, and regulators to share real-time threat intelligence.
2. For Individuals:
- Replace SMS-based 2FA with authenticator apps like Google Authenticator or Duo.
- Stay alert to phishing websites and unsolicited messages requesting personal details.
- Report any unexpected SIM deactivations or unauthorized account access immediately.
Despite ongoing efforts to combat SIM swapping fraud, cybercriminals continue to adapt and evolve their tactics. Without stronger security measures and heightened awareness, individuals remain vulnerable to financial and identity theft.