Proton
A phone screen with a speech bubble with a phone number in it

What can someone do with your phone number to hack you?

If hackers have your email address, you’re a potential target for phishing attacks that can deliver ransomware, infostealers, and other malware. Because we’re all online all the time, most people have become more aware of these kinds of cyberthreats.

But did you know your phone number is just as valuable?

In this article, we’ll explain how hackers can find your phone number and use it to scam you. More importantly, we’ll show what you can do to stop them.

What can someone do with your phone number?

Your phone number is deeply embedded in your digital identity. It’s connected to other personally identifiable information, including your address, your banking information, and your medical records. There’s a lot of incentive for bad actors to acquire kind of personal data they can, so that they can keep digging for more. If a hacker finds your phone number, they can use it to target you in a variety of ways.

Phishing attacks and spam

Phishing scams, a form of social engineering, are used to manipulate you into sharing personal information. They can take many forms, including emails, texts, and phone calls.

For example, you may be familiar with phishing scam calls: Someone claiming to represent an insurance company may call you to let you know you’re entitled from a car accident. Or someone claiming to represent your bank claims you need to pass a security check to receive an important message about your account.

Scammers use these tactics to try to steal more personal data from you so that they can steal money or commit identity theft, and they’re extremely common: According to the FBI’s Internet Crime Complaint Center, people reported more than 193,000 phishing attacks(новое окно) in 2024.

SIM-swapping

In a SIM-swapping attack (also known as port-forwarding), scammers contact your phone company to ask them to port your phone number over to a new SIM card. Once the number is registered to their SIM card, they can make calls and send texts from your number, allowing them to contact anyone in your phone book. They can also intercept two-factor authentication SMS codes to gain access to your accounts. That’s why it’s always best to use a 2FA authenticator app rather than SMS.

Your social media profiles, email accounts, and logins for all of your accounts become available if scammers manage to carry out a SIM-swapping attack.

Identity theft

Once a scammer has collected enough of your personal data, they can begin to make purchases, withdraw money from your bank accounts, and apply for loans in your name. This is full identity theft and it’s difficult to recover from: You’ll need to inform your bank and government services, and update potentially hundreds of website logins.

How can someone get your phone number?

Hackers have many methods for finding and exploiting victims, including:

  • Data breaches: Bundles of phone numbers are collected by hackers in data breaches and sold on the dark web. Hackers trade and sell personal information so that they can find out how to target you with scams.
  • Data brokers: Data brokers can legally sell personal data for marketing purposes.
  • Phishing scams: By impersonating a trusted authority such as your bank or a government agency, scammers can convince you to give them personal information.
  • Your social media: If you’ve ever shared your phone number online, it’s easy for scammers to dig through your social media profiles, personal or business websites, or message boards to find this information.

Attempts to exploit phone numbers are on the rise around the world. The UK’s Office of Communications (Ofcom) estimates that 82% of adults in the UK(новое окно) had received a suspicious message in the form of a text, recorded message, or phone call to a mobile or landline. So much of our personal information is available online that it’s never been easier for scammers to target victims, and our phone numbers are a vital piece of information to protect.

Protect your phone number from being leaked

The best way to protect your phone number is to be aware of where you’re sharing it. Don’t share it online, and make sure that you don’t give it out to anyone you don’t trust, whether it’s a business or an individual.

Be aware of phishing scams and spam

Unfortunately, phishing and scam attempts are now part of our daily lives. Taking the extra time to verify the identity of someone who’s calling or emailing you is worth it. Never give out personal or financial details on the phone, and if you’re uncomfortable with a phone call you’ve received you can hang up and call the company back using their phone number as listed on their official website.

You can report phishing attempts and scam telephone calls to organizations such as Action Fraud(новое окно) and USAGov(новое окно), which will ultimately help in the fight against scammers. You can also add yourself to the National Do Not Call Registry(новое окно) or the Telephone Preference Service(новое окно), which will opt you out of sales and marketing calls.

Mitigate data breaches with dark web monitoring

If your data appears on the dark web, this gives hackers an opportunity to buy it and begin to target you with scams. Proton Pass, a password manager built to help you manage your online identity, also offers dark web monitoring. You’ll be notified automatically if any of your personal data is compromised, giving you a chance to act quickly. You’ll be able to see what data was compromised and potentially the service that compromised it. You can also see all known breaches that could have affected your accounts in the last two years.

Protect all of your personal data from hackers

There are many ways you can proactively protect your phone number and all of your other personally identifiable data. As a general rule, protecting all of your sensitive information is the best way to prevent being affected by a data breach or getting hacked.

Use hide-my-email aliases to prevent spam

Protecting your passwords seems obvious, and now you know that protecting your phone number is important. But did you know that protecting your email address is just as important? Your email address is your digital passport, attached to nearly all of your online accounts and practically a map of your online behavior and preferences.

To prevent your email address from falling into scammers’ hands, you can use hide-my-email aliases. These aliases are randomly generated email addresses that forward emails to your personal inbox. They mask your personal email address, meaning that if there’s a data breach or your data is sold to a data broker, hackers won’t be able to connect the alias to any of your personal data.

Create secure, varied passwords

The easiest way to protect yourself online is by using an end-to-end encrypted password manager like Proton Pass. Not only can Proton Pass help you create, store, and autofill all of your passwords, it can help you control how much personal data you share online. The built-in password generator makes it easy to use secure, unique passwords for each of your accounts. This makes it much more difficult for hackers to access your accounts, even if they get hold of one of your passwords in a data breach. Having a secure password also protects you from brute-force attacks where hackers can guess your password.

Improve your cybersecurity with two-factor authentication (2FA)

Two-factor authentication (2FA) strengthens the security of your online accounts. Rather than simply using a password, 2FA asks you to also input a one-time password generated in an authenticator app or use a physical security key. This additional identity verification makes it harder for someone to access your accounts, even if you accidentally divulge your password to a hacker. Proton Pass offers a built-in 2FA authenticator to make logging in more secure without compromising on ease.

Protect your phone number and your online identity with Proton Pass

Proton Pass offers multiple tools to help you stay safe online and protect more than just your phone number online. Find out more about the plans we have available and ensure that your phone number doesn’t end up in the wrong hands.

Защитите свои пароли
Создать бесплатный аккаунт

Статьи по теме

A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Новости о конфиденциальности
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Новости о конфиденциальности
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
  • Советы о конфиденциальности
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
  • Советы о конфиденциальности
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how
en
  • Советы о конфиденциальности
Read what age experts say you should let your child use different platforms and how you can help set them up for success.