Is someone checking your browsing? This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly. Learn more about staying safe online
Need support? 1800RESPECT (1800 737 732) | Emergency: 000

Intercepting Your Security Codes

Someone intercepts the security codes sent to verify your identity — by accessing your text messages, SIM-swapping your phone number, or using a device you've already trusted.

What You Might Notice

  • You stop receiving text messages or calls

    Your SIM may have been swapped — the other person has transferred your number to their device.

  • Login codes arrive on a device you don't control

    Security codes are going to a phone or email the other person has access to.

  • Your mobile service suddenly stops working

    SIM swap attacks cause your phone to lose signal entirely.

What You Can Do

  • Switch to an authenticator app instead of SMS codes

    Apps like Google Authenticator or Authy generate codes on your device, which is harder to intercept than text messages.

  • Set a PIN or password on your mobile account

    Contact your carrier and add a security PIN to prevent SIM swaps.

  • Use a phone number the other person doesn't know

    A separate prepaid number for two-factor authentication adds a layer of protection.

Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.

If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.

This framework is under active development. View full limitations & methodology.