How Cell Phones are Cloned and How To Stop it From Happening To You

Cell phone cloning, while not as major a problem as it used to be, continues to be an issue for some mobile phone users. Cell phone cloning is a method, using electronic equipment, for criminals to to steal the identity of a phone, hijack the carrier, and get free service for themselves. This can be anything from a minor nuisance to a catastrophe for the person whose phone is cloned. The consequences range from having bogus charges appearing on one’s bill, all the way up to criminal charges being filed if a cloned phone is then used to commit a crime. It is a serious problem. In this article, I will explain what cell phone cloning is, how it works, and what you can do to protect yourself against cell phone cloners.

How cell phone cloning works

Cloning a cell phone is a two-step process. First, the crooks use an electronic scanner to detect the electronic identity number of the SIM card in a nearby phone. There are a variety of different kinds of scanners and they can be found on the dark web among other places; it isn’t our goal here to teach you how to clone a phone so I’m not going to link to any of the places where they can be bought. Scanners are relatively expensive and relatively difficult to get, but it’s not impossible. Today, because most phones have significantly enhanced security against cloning operations, a phone cloner is much more likely to try to get physical access to the SIM card. With physical access to the card, cloning is relatively easy to accomplish.

Once the cloner has the information (usually consisting of the electronic serial number of the SIM card, and its authentication key), they will use a SIM writer to make a duplicate SIM card. Because SIM writers are legitimate tools with many legal uses, they are easy and inexpensive to acquire and anyone with $10 or $15 to spare can get one via Ebay without even trying. The cloner can then put the duplicated SIM card in another phone, and use that phone to make calls and connections under the original phone owner’s account.

It used to be much easier to clone cell phones than it is today. In the early days of cellular communication, both the phones themselves and the cell network they operated on used analog technology. Now all cell phones are digital and their signals are encoded and encrypted, making it almost impossible to scan for SIM information. There is one weakness in the system, however, and that is the existence of analog backups.

In high-traffic areas, many carriers keep analog cell stations running to handle overflow. When a single station becomes very busy, it overflows some calls to the old analog network. Someone with a scanner within range of that network can harvest your phone’s identifying information. Analog systems used CDMA technology which transmitted your phone’s ESN (Electronic Serial Number) and MIN (Mobile Identification Number) along with the call data. Digital systems use GSM which shifted to using a phone’s IMEI. Where once you could capture the ESN and MIN relatively easily and flash a blank phone with the data to clone it, IMEI is slightly different. Now you need to capture IMEI data and use a hardware SIM reader and writer to clone the SIM, not the card.

The signs of a cloned phone

There is no easy wat to tell that your phone has been cloned. However, there are a few telltale signs that may indicate something is up, including:

  • A call from your carrier asking if you have traveled.
  • A sudden increase in calls or SMS messages from unknown or unfamiliar numbers.
  • More wrong numbers or abandoned incoming calls than usual.
  • Disappearing voicemails or difficulty accessing your voicemail.
  • More and/or unusual call activity on your bill.

If you do suspect foul play there are a couple of other things you can check.

If you use Android, use Google Find my Phone to see where it thinks you are. If you use iPhone, use iCloud to do the same. These are not exact, but they should at least offer a clue if your phone has been cloned by someone in a different country. However, this will only work if location is enabled on the phone.

The only other way to detect if your phone has been cloned is by keeping an eye on your phone bill. Check it each month and note any unusual calls. Use reverse phone lookup if they are not clearly identified to see who they might have been. Talk to your carrier if you have any suspicious calls, as they will be able to identify the cell tower with which the call originated.

Preventing phone cloning

The most effective step you can take to prevent your phone being cloned is not to let it out of your sight or let it fall into the possession of another person. Because of the enhanced security in the phone networks, it’s very difficult, bordering on impossible, for someone to effectively clone your phone just because you walk past their scanner. Instead, they have to physically get their hands on the device so that they can pull the identifiers off the hardware.

You should definitely secure your phone using a PIN number or a biometric (fingerprint) password, so that if you lose your phone, someone else can’t get access to it. To prevent wireless interception of your information, turn off Bluetooth and WiFi when you’re not using them. Don’t install suspicious apps that you aren’t 100% certain aren’t cloneware. Cellphone cloning isn’t as prevalent as it once was, but it still happens. While there is little to do to completely prevent it, these basic precautions will lower the chances significantly.

We’ve got a lot of other articles on cell phones.

Want to enhance your phone’s security? See our tutorial on preventing your cell phone from being tracked.

Think there might be hidden cameras around? We’ll show you how to detect hidden cameras with your Android smartphone or with your iPhone.

Need to charge a phone but all you have is another phone? You can charge one phone from another cell phone!

Want better signal on your phone? We’ve got a tutorial on improving cell phone reception.

Would you like a second phone number for your Android smartphone? See our article on how to get a second number for your phone.

19 thoughts on “How Cell Phones are Cloned and How To Stop it From Happening To You”

Terry Caron says:
Williamsdhackghost @ gmail com is the best that can help you catch a cheating spouse. Write him now
cynthia amstrong says:
cyberking01 is the best. this team gave me access to my partner’s highly secured device.
W I L L I A M S D H A CKGHOST @ Gee-Mail says:
Need help on how to catch and track a cheating spouse? Who can help? Above can
Maria tyson says:
Do you need cheating proof without access to the phone?
Do you want to hack and track a phone without access to it?
If yes, contact CYBER KING01 @ proton mail . com today. This team made my phone hack proof and also gave me access to my spouse’s phone..
thomas says:
Maria tyson says:
Do you need cheating proof without access to the phone?
Do you want to hack and track a phone without access to it?
If yes, contact CYBER KING01 @ proton mail . com today. This team made my phone hack proof and also gave me access to my spouse’s phone.
Marissa Janet says:
The real deal is “W I L L I A M S D H A C K G H O S T
G M A I L” who can help you remotely track your cheating spouse device and get your troubles gone
maria tyson says:
thank me later
sandra says:
thanks for recommending cyberking01 this team helped me too.
Ohnonotme says:
My phone has cloned messages being rerouted how do I stop it without getting a new phone
Julia N Contreras says:
locked n loaded says:
Funny she said people are dying bc of phones being cloned. They probably are dying bc the person who got their phone cloned tracked down the pieces of shit and shot them between the eyes!that would be a sight!
Arlene White says:
My son in laws has been cloned and his service provider won’t help us to figure out who cloned it and how to fix it and FCC wasn’t much help either
Just another person who's learned a lot says:
Look into sadistic stalking, Patricia.
Me says:
HOME ADVISOR USES PHONE CLONING to give leads to their paying contractors. How else would they get a guaranteed list of customers. It is happening to my stump grinding business. they are rerouting my calls and listening in on the ones that get through to give my customers names to home advisor paying contractors. i am not a home advisor contractor and my customers are not using home advisor to find a contractor, but some how my customers are having other stump grinders show up to do the work. DO not use home advisor!!!!
Nikhil Dhariya says:
Wow,That’s very informative.I’m glad that I came across this article.I have heard about cloning but did not know what it is .Very informative .Got to know many things. Need to check my location to make sure that there is no cloning .Thank you so much.
Ellen Flatt says:
My husband did this so he could tell where I was. He needed to know my whereabouts because he was cheating and didn’t want to get caught.
Tracy James Givens says:
I hope you got yourself a new husband or at least got rid of the one you have
Patricia Wark says:
I have had multople cellphones cloned. I even stopped using technology for 5 years ixluding phones. Now have a new one and it’s happening again. The terrorists doing this have a target list and they resteal identities and keep on cloning. This is all a multi-billion dollar problem that governments and intelligence agencies are NOT tackling head on. People are dying because of this. Keep publishing. Keep looking.
Donkey D says:
Dnot drink the koolaid! It’s contaminated with intelligent biological parasites. They will take over your thoughts and control your actions. Stay away from Cherry Koolaid!
Justagurl says:
I seriously just chugged a gallon of it.. but I think it may have been cherry lemonade so I have no idea if that’s good or bad but either way I’m still really thirsty and.. Oh, there’s some gentlemen in black cars wearing black suits and sunglasses at the door. I’ll be right back…

Leave a Reply to Julia N Contreras Cancel reply

Your email address will not be published. Required fields are marked *

Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way.