How Cell Phones are Cloned and How To Stop it From Happening To You

Cell phone cloning, while not as prevalent as it used to be, continues to be an issue for some mobile phone users. Cell phone cloning is a method, using electronic equipment, for criminals to steal the identity of a phone, hijack the carrier, and get free service for themselves.

This can be anything from a minor nuisance to a serious problem for the victim of cloning. The consequences range from having bogus charges appearing on one’s bill, all the way up to criminal charges being filed if a cloned phone is then used to commit a crime.

In this article, I will explain what cell phone cloning is, how it works, and what you can do to protect yourself against cell phone cloners.

How cell phone cloning works

Cloning a cell phone is a two-step process.

First, the crooks use an electronic scanner to detect the electronic identification number of the SIM card in a nearby phone. There are a variety of different kinds of scanners and they can be found on the dark web among other places; it isn’t our goal here to teach you how to clone a phone so I’m not going to link to any of the places where they can be bought.

Scanners are relatively expensive and difficult to get, but not impossible. Most phones have significantly enhanced security against cloning operations, a phone cloner is much more likely to try to get physical access to the SIM card. With physical access to the card, cloning is relatively easy to accomplish, especially for those on the GSM network where swapping sim cards between phones is simple.

Once the cloner has the information (usually consisting of the electronic serial number of the SIM card, and its authentication key), they will use a SIM writer to make a duplicate SIM card.

Because SIM writers are legitimate tools with many legal uses, they are easy and inexpensive to acquire and anyone with $10 or $15 to spare can get one via eBay without even trying. The cloner can then put the duplicated SIM card in another phone, and use that phone to make calls and connections under the original phone owner’s account.

It used to be much easier to clone cell phones than it is today. In the early days of cellular communication, both the phones themselves and the cell network that supports the phone operated on used analog technology.

Now all cell phones are digital and their signals are encoded and encrypted, making it almost impossible to scan for SIM information. There is one weakness in the system, however, and that is the existence of analog backups.

In high-traffic areas, many carriers keep analog cell stations running to handle the overflow. When a single station becomes very busy, it overflows some calls to the old analog network. Someone with a scanner within range of that network can harvest your phone’s identifying information.

Analog systems used CDMA technology which transmitted your phone’s ESN (Electronic Serial Number) and MIN (Mobile Identification Number) along with the call data. Digital systems use GSM which shifted to using a phone’s IMEI.

The ESN and MIN used to be simple to flash, IMEI is slightly different. Now you need to capture IMEI data and use a hardware SIM reader and writer to clone the SIM, not the card.

The signs of a cloned phone

There is no easy way to tell that your phone has been cloned. If your friends and family and receiving phone calls from you, your phone number may have been “spoofed” meaning someone is using an application that mimics your phone number on caller ID. Your phone may have been hacked as well.

Tracking the location and activity of your phone is different from cloning. Here is an article to help you prevent your cell phone from being tracked.

However, there are a few telltale signs that may indicate your phone has been cloned, including:

  • A call from your carrier asking if you have traveled.
  • A sudden increase in calls or SMS messages from unknown or unfamiliar numbers.
  • More wrong numbers or abandoned incoming calls than usual.
  • Disappearing voicemails or difficulty accessing your voicemail.
  • More and/or unusual call activity on your bill.
  • Your phone suddenly stops making phone calls or connecting to the cellular network – this happens when someone duplicates a SIM card and puts it in a different phone.

If you do suspect foul play there are a couple of other things you can check.

If you use Android, use Google Find my Phone to check your phone’s location. If you use iPhone, Find My iPhone to do the same. These are not exact, but they should at least offer a clue if your phone has been cloned by someone in a different country. However, this will only work if the location is enabled on the phone.

You can check your call and text log online with most carriers. This will alert you that there’s suspicious activity such as; phone numbers dialed that you’re certain didn’t come from your phone.

Talk to your carrier if you have suspicions. Although carriers do not track your phone or your activity, they can provide you with a new SIM card or direct you to an updated list of your call and text activity.

Preventing phone cloning

The most effective step you can take to prevent your phone from being cloned is not to let it out of your sight or let it fall into the possession of another person. Because of the enhanced security in the phone networks, it’s very difficult, bordering on impossible, for someone to effectively clone your phone just because you walk past their scanner.

Instead, they have to physically get their hands on the device so that they can pull the identifiers off the hardware or download a cloning application.

You should definitely secure your phone using a PIN number or a biometric (fingerprint) password so that if you lose your phone, someone else can’t get access to it. To prevent wireless interception of your information, turn off Bluetooth and WiFi when you’re not using them.

Don’t install suspicious apps that you aren’t 100% certain aren’t Cloneware. Cellphone cloning isn’t as prevalent as it once was, but it still happens. While there is little to do to completely prevent it, these basic precautions will lower the chances significantly.

How to Fix a Cloned Cell Phone

The first action you should take if you feel that your phone has been cloned is to get a new SIM card. Whether your carrier is on the CDMA network (Sprint and Verizon) or the GSM (AT&T and T-Mobile) network, updating the SIM card number within the carriers system means the hacker can no longer use your phone number.

It isn’t likely that someone can clone a cell phone that is attached to an eSIM. This type of SIM card is hardwired into newer smartphone models like the Google Pixel models and the newest iPhones.

You can always buy a new cellphone, but changing the SIM card should suffice. It’s important that you shred or dispose of your old SIM cards properly. The CDMA network SIM cards are reusable but only compatible with your phone’s IMEI number once activated.

GSM carriers allow you to swap your SIM card between any model of phone, but once a new SIM is activated on your phone number, the previous one is disabled. This means that if you activate a new sim card, the old one will no longer work.

 

12 thoughts on “How Cell Phones are Cloned and How To Stop it From Happening To You”

Avatar Steven C Newman says:
I can’t get my phone until cloned , I have had 150 phones never had a phone bill until 40 yrs old I am know 44 . I’m not important, I’m on disability for sqizoeffctive. This clone is enabled for the disabling of my health. Is there a way of knowing who is cloning my phone . Take them to court for abuse of the disabled.
Avatar acephanthom on gmail says:
Reach out to get proof infidelity.
Avatar W I L L I A M S D H A CKGHOST @ Gee-Mail says:
Need help on how to catch and track a cheating spouse? Who can help? Above can
Avatar Ohnonotme says:
My phone has cloned messages being rerouted how do I stop it without getting a new phone
Avatar Julia N Contreras says:
Clone/Fraud/Pirating/Stalker/Terrorists/
Avatar locked n loaded says:
Funny she said people are dying bc of phones being cloned. They probably are dying bc the person who got their phone cloned tracked down the pieces of shit and shot them between the eyes!that would be a sight!
Avatar Arlene White says:
My son in laws has been cloned and his service provider won’t help us to figure out who cloned it and how to fix it and FCC wasn’t much help either
Avatar Just another person who's learned a lot says:
Look into sadistic stalking, Patricia.
Avatar Me says:
HOME ADVISOR USES PHONE CLONING to give leads to their paying contractors. How else would they get a guaranteed list of customers. It is happening to my stump grinding business. they are rerouting my calls and listening in on the ones that get through to give my customers names to home advisor paying contractors. i am not a home advisor contractor and my customers are not using home advisor to find a contractor, but some how my customers are having other stump grinders show up to do the work. DO not use home advisor!!!!
Avatar Nikhil Dhariya says:
Wow,That’s very informative.I’m glad that I came across this article.I have heard about cloning but did not know what it is .Very informative .Got to know many things. Need to check my location to make sure that there is no cloning .Thank you so much.
Avatar Ellen Flatt says:
My husband did this so he could tell where I was. He needed to know my whereabouts because he was cheating and didn’t want to get caught.
Avatar Tracy James Givens says:
I hope you got yourself a new husband or at least got rid of the one you have
Avatar Patricia Wark says:
I have had multople cellphones cloned. I even stopped using technology for 5 years ixluding phones. Now have a new one and it’s happening again. The terrorists doing this have a target list and they resteal identities and keep on cloning. This is all a multi-billion dollar problem that governments and intelligence agencies are NOT tackling head on. People are dying because of this. Keep publishing. Keep looking.
Avatar Donkey D says:
Dnot drink the koolaid! It’s contaminated with intelligent biological parasites. They will take over your thoughts and control your actions. Stay away from Cherry Koolaid!
Avatar Justagurl says:
I seriously just chugged a gallon of it.. but I think it may have been cherry lemonade so I have no idea if that’s good or bad but either way I’m still really thirsty and.. Oh, there’s some gentlemen in black cars wearing black suits and sunglasses at the door. I’ll be right back…

Leave a Reply

Your email address will not be published. Required fields are marked *


Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way.