Back to blog
Security
6 min

SIM Swap Fraud: How Japan Achieved Zero Cases and What You Can Learn

Japan eliminated SIM swap fraud entirely after a 2022 surge. Learn the tactics criminals used, the countermeasures that worked, and how to protect yourself from this global threat.

LOCK.PUB
2026-03-22

SIM Swap Fraud: How Japan Achieved Zero Cases and What You Can Learn

In 2022, Japan experienced a sharp surge in SIM swap fraud. Criminals armed with forged My Number Cards (Japan's national ID) walked into carrier shops, convinced staff to issue replacement SIM cards, and hijacked victims' phone numbers. Once they controlled the number, they intercepted SMS one-time passwords and drained bank accounts and crypto wallets.

Then Japan did something remarkable: it stopped SIM swap fraud entirely. Since May 2023, there have been zero reported cases. Here's how it happened, and why the lessons matter even if you don't live in Japan.

What Is SIM Swap Fraud?

SIM swap fraud (also called SIM hijacking or SIM jacking) is an attack where a criminal convinces your mobile carrier to transfer your phone number to a new SIM card they control.

The Attack Chain

  1. Reconnaissance — The attacker gathers your personal information through phishing, social engineering, data breaches, or social media
  2. Identity forgery — They create fake identification documents
  3. Carrier shop visit — They impersonate you and request a SIM replacement
  4. SMS interception — All texts sent to your number now go to the attacker
  5. Account takeover — They use SMS-based two-factor authentication codes to access your bank, email, and crypto accounts

The victim's phone suddenly shows "No Service." By the time they realize something is wrong, the damage is done.

Japan's 2022 Crisis

Japan's SIM swap outbreak was systematic and organized:

  • Criminal rings manufactured convincing fake My Number Cards (マイナンバーカード)
  • Teams visited multiple carrier shops across different regions
  • Unauthorized bank transfers reached tens of millions of yen
  • Cryptocurrency theft was widespread
  • The National Police Agency flagged it as a critical emerging threat

How Japan Eliminated SIM Swap Fraud

Japan's success came from a coordinated, multi-layered response.

1. IC Chip Verification for Identity Documents

Instead of visual inspection alone, carrier shops were required to verify the IC chip embedded in My Number Cards electronically. Forged cards that looked authentic could not pass electronic verification.

2. Stricter Carrier Procedures

NTT Docomo, au (KDDI), and SoftBank all implemented enhanced verification:

  • In-person identity confirmation for all SIM changes
  • Additional authentication steps for online SIM requests
  • Suspicious request detection systems

3. Government and Law Enforcement Coordination

  • The Ministry of Internal Affairs revised guidelines under the Mobile Phone Improper Use Prevention Act
  • Police raided counterfeit ID manufacturing operations
  • Arrests of organized fraud rings followed

The Result

Zero reported SIM swap fraud cases since May 2023. Japan became a global model for SIM swap prevention.

Why You Should Still Worry

Even if you live in a country that hasn't experienced major SIM swap attacks, the underlying vulnerability remains.

Risk Factor Details
SMS is inherently insecure The SS7 protocol that routes SMS messages has known vulnerabilities
Carrier staff are human Social engineering can bypass procedures in many countries
Global travel exposure Your SIM could be targeted while abroad
Growing attack surface As more services use SMS 2FA, the incentive for attackers grows

In the United States alone, the FBI reported thousands of SIM swap complaints annually, with losses in the hundreds of millions of dollars.

How to Protect Yourself

The core lesson from Japan's experience: stop relying solely on SMS-based two-factor authentication.

Switch to Authenticator Apps

  • Google Authenticator — Free, straightforward
  • Microsoft Authenticator — Includes cloud backup
  • Authy — Multi-device support

Go to the security settings of your important accounts (bank, email, crypto exchange) and switch from SMS to an authenticator app.

Adopt Passkeys

Passkeys (FIDO2) are phishing-resistant and don't depend on your phone number at all. Apple, Google, and Microsoft all support them now.

Secure Your Backup Codes

When you set up an authenticator app, most services provide backup codes for recovery. These are your lifeline if you lose your phone.

Don't store them:

  • In your phone's notes app
  • In an iMessage or Messenger conversation with yourself
  • In an email draft

Store them safely:

  • Write them on paper and lock them away
  • Use a password manager
  • Use LOCK.PUB encrypted memo

With LOCK.PUB, you can create a password-protected encrypted memo containing your backup codes. Only someone with the password can access it — not even LOCK.PUB's servers can read the content.

Security Checklist

Action Done?
Switch bank accounts from SMS 2FA to authenticator app
Secure cryptocurrency exchange accounts with app-based 2FA
Store backup codes in a secure location
Enable passkeys on your primary Google/Apple account
Review 2FA settings on social media accounts
Set a strong PIN/password with your mobile carrier
Remove unnecessary personal information from social media

The Global Picture

While Japan solved its SIM swap problem, other countries continue to struggle:

  • United States — Thousands of cases annually, with the FCC introducing new rules in 2024
  • United Kingdom — Inconsistent carrier responses remain a concern
  • Southeast Asia — Weaker ID verification makes attacks easier
  • Africa — Rapid mobile banking growth has outpaced security measures
  • Latin America — SIM swap attacks are rising alongside mobile payment adoption

If you travel internationally, be aware that your home carrier's protections may not extend abroad.

Lessons from Japan

Japan's success proves that SIM swap fraud is a solvable problem — but it requires cooperation between government, carriers, and law enforcement. At the individual level, the takeaway is clear:

  1. Move beyond SMS — Use authenticator apps and passkeys
  2. Protect your recovery codes — Store them in encrypted, secure locations like LOCK.PUB
  3. Guard your personal information — Limit what you share publicly
  4. Stay informed — Threats evolve, and so should your defenses

Security is not a one-time setup. Review your protections regularly and adapt as new threats emerge.


Need a secure place to store your backup authentication codes? Try LOCK.PUB's password-protected encrypted memo — only you can unlock it.

Keywords

SIM swap prevention
SIM swap fraud
SIM swap Japan
SMS two-factor authentication risk
phone number hijacking

Create your password-protected link now

Create password-protected links, secret memos, and encrypted chats for free.

Get Started Free
SIM Swap Fraud: How Japan Achieved Zero Cases and What You Can Learn | LOCK.PUB Blog