What is a SIM farm scam? How it works and how to stop it
The scam text on your phone was almost certainly not sent by a person. It was dispatched by rented infrastructure racks of real smartphones and modems running commercial software, distributed across at least 94 locations in 17 countries, designed to produce mobile traffic that looks indistinguishable from your neighbor sending a message. A SIM farm scam works by routing fraudulent messages through this hardware so that carriers see legitimate device traffic, not spam. Security researchers at Infrawatch mapped this network earlier this year and found 87 exposed control panels tied to a single platform called ProxySmart, with confirmed farm locations across 19 U.S. states (Cybersecurity News, April 2026).
These texts keep arriving because scammers now rent carrier-grade mobile infrastructure that makes fraud look like ordinary traffic and spam filters largely cannot tell the difference. Text messages are opened at rates as high as 98%, one reason SMS has become a preferred delivery channel; nearly every message lands (FTC, April 2025). ProxySmart, the platform at the center of Infrawatch's investigation, is sold on a per-SIM pricing model and handles device management, automated IP rotation, customer provisioning, and anti-bot countermeasures a fully commercial product for running mobile fraud infrastructure (Help Net Security, April 2026).
This guide explains what SIM farms are, why the commercial "as-a-service" model makes them so difficult to block, what they enable beyond spam texts, and most importantly the specific defenses worth your time. Not seven generic tips: three high-impact actions grounded in why conventional filtering fails.
What is a SIM farm scam, and why does it look legitimate to your carrier?
Video of the Day
A SIM farm is a network of hundreds or thousands of mobile SIM cards, backed by physical hardware phones and cellular modems operating simultaneously under automated control. Each SIM registers as a distinct mobile device on an actual carrier network. To the carrier's systems, traffic from a warehouse of 500 phones looks identical to 500 people sending individual messages, because it is using the same network in exactly the same way (ZDNet, April 2026).
ProxySmart is not hacker tooling cobbled together in someone's basement. It is a commercial software stack built specifically to operate and monetize this hardware. Sold on a per-SIM pricing model, it handles provisioning, plan enforcement, automated IP rotation, and anti-bot countermeasures. Infrawatch traced the platform to an operator based in Minsk, Belarus; it is actively marketed across Telegram channels, including to Russian-speaking buyers seeking U.S.-located mobile connectivity to access geo-restricted platforms (Help Net Security, April 2026). This is a globalized commercial market, not a cottage industry.
The hardware required to join this ecosystem is not exotic. The Alcatel IK4 modem used in some farms is available on Amazon and eBay. Phones enroll through an unsigned Android app downloaded from ProxySmart's website. Meaningful identity checks are rare some providers explicitly advertise zero KYC requirements, making carrier-grade mobile connectivity available to any buyer with a payment method (Cybersecurity News, April 2026).
SIM farms were not originally built for fraud. Industry reporting traces them to telecom testing, bulk messaging arbitrage, and legitimate application-to-person SMS delivery before the model migrated toward abuse (TADSummit Blog, August 2024). That history explains why the hardware itself remains legal in most countries and why regulators have been slow to act.
Video of the Day
How SIM farms send spam texts and evade detection
The evasion stack built into platforms like ProxySmart has four distinct layers, and understanding them explains why carrier-level filtering alone cannot solve this problem.
Mobile proxies operate behind carrier-grade NAT, an architecture where a single IP address is shared by many legitimate subscribers. Blocking that IP would take out real users alongside fraudulent traffic, so IP-based filtering is largely ineffective here. Think of it as closing a highway ramp because one driver ran a red light; the ramp serves thousands of legitimate trips (Cybersecurity News, April 2026).
ProxySmart compounds this by refreshing each device's IP address automatically. Toggling airplane mode for three seconds forces the carrier to assign a new address, so any specific block expires almost immediately (Help Net Security, April 2026). On top of that, the platform lets operators configure each proxy port to present network signatures associated with macOS, iOS, Windows, or Android. Traffic from a rack of budget modems in a rented apartment can appear, to any fingerprint-based detection system, to be coming from an iPhone in a coffee shop (Cybersecurity News, April 2026).
AT&T in the U.S. and Three in the U.K. have implemented countermeasures that block this spoofing a meaningful development, but an isolated one among the 35 carriers connected to the ProxySmart network (Help Net Security, April 2026). Finally, operators are advised to route traffic through a reverse proxy on cloud infrastructure, adding another layer between the farm's physical location and anyone trying to trace the source.
Because this evasion stack defeats filtering upstream, scam texts will continue to arrive regardless of what most carriers do. The question shifts: not how to stop them from reaching you, but how to make sure they cannot do anything when they do.
What SIM farm phishing attacks enable and why enforcement is struggling
When fraudsters have a farm at their disposal, bulk phishing at scale becomes trivially easy. Because each SIM registers as a separate device on a real carrier, operators can send messages from local numbers a U.S. number to target a U.S. recipient, a German number for a German one. That local origin makes the message more plausible and bypasses some geographic filters (ZDNet, April 2026).
SIM farms are also used to receive SMS verification codes at scale during account creation, enabling bulk fake account creation on platforms that rely on phone-number verification. The farm simply acts as the receiving device when signing up for new accounts this is distinct from intercepting codes mid-transmission. The result powers social media bot networks, scalping operations, and payment fraud (Cybersecurity News, April 2026).
SIM swapping is a related but distinct threat worth separating clearly. A SIM swap occurs when a criminal impersonates you to your carrier's customer service and convinces a representative to transfer your phone number to a SIM they control a social-engineering attack against the carrier, not a SIM-farm operation. The connection is a shared vulnerability: both threats exploit the fact that a phone number remains a weak identity layer. A criminal who successfully swaps your SIM can then receive any SMS-based verification codes sent to your number, giving them a short window to access any account using SMS two-factor authentication (ZDNet, April 2026). Different threat, different defense covered below.
Enforcement has landed some real blows. In September 2025, the U.S. Secret Service dismantled a SIM farm operating near the UN in New York more than 300 co-located SIM servers and 100,000 SIM cards. Law enforcement warned the operation was large enough that it could potentially have caused cellular disruption and jammed 911 lines, though those are official warnings rather than demonstrated outcomes (Cybersecurity News, April 2026). The following month, Europol's Operation SIMCARTEL resulted in seven arrests in Latvia and the seizure of 1,200 SIM-box devices and 40,000 active SIM cards, tied to more than 1,700 documented fraud cases (ZDNet, April 2026).
Still, enforcement cannot keep pace, for a structural reason: in most jurisdictions, the hardware itself is not illegal. SIM farms exist in a regulatory gap between lawful telecoms equipment and abusive application. As Infrawatch CEO Lloyd Davies put it, "The legal grey area that SIM farms sit in has allowed that model to scale with limited disruption and we assess that it's highly likely to be facilitating large-scale fraud operations" (Help Net Security, April 2026). The UK government has announced plans to ban the possession and supply of SIM farms one of the first attempts by any government to close this legislative gap directly but the 17-country footprint of a single platform suggests the ecosystem will continue operating well ahead of regulatory reach (ZDNet, April 2026).
How to stop scam text messages from SIM farm operations
Seven anti-scam tips is noise. Three meaningful changes is a plan. Because this infrastructure bypasses carrier filtering, scam texts will reach you. The goal is to make sure that when they do, they lead nowhere.
Step 1 Never click links in unexpected texts.
This is the entire attack surface for the phishing component. A SIM farm's job is to deliver a message with a link; its value depends entirely on whether you click. If a message claims to require action on an unpaid toll, a failed delivery, or a suspicious charge, go straight to the company's site or app directly do not use the link in the text. The FTC notes that urgency is the primary manipulation lever in these scams; the pressure to act fast is a deliberate design choice, not coincidence (FTC, April 2025).
Step 2 Set a PIN on your carrier account today.
This is the primary defense against SIM swapping a different threat from SIM farm spam, but one that exploits the same dependency on your phone number. A PIN requirement means that even if a criminal knows your name, address, and last four digits of your Social Security number, they cannot transfer your phone number without it. Most major carriers support this in account settings. CISA guidance is explicit: a carrier PIN is a critical step in countering SIM-swapping techniques, because it is required before a number port can be completed (CISA, November 2025).
Step 3 Move your most important accounts off SMS-based authentication.
SMS is not encrypted. A threat actor with access to carrier infrastructure can read those messages, and SMS-based MFA is not phishing-resistant meaning it can be bypassed even without intercepting the message directly. Both SIM farms and SIM swapping exploit the assumption that your phone number is a secure identity layer. Switch banking, email, and work accounts to a FIDO-based authenticator a hardware security key or passkey or at minimum an authenticator app. Once enrolled, disable the SMS fallback option so it cannot be used as a recovery path (CISA, November 2025).
Supporting habits lower effort, still useful:
Recognize the patterns. Generic greetings, grammatical errors, shortened or mismatched URLs, and fabricated urgency are consistent markers of scam messages. Legitimate organizations do not request payment or personal information by text. Pattern recognition adds a fast first filter, even if it does not replace the three steps above (ZDNet, April 2026).
Report rather than just delete. Forward suspicious messages to 7726 (SPAM on a keypad) to route reports to your carrier for analysis. Most phones also offer a built-in "Report Junk" option. Individual reports matter less than the aggregate signal they provide to carrier detection systems (FTC, April 2025).
If you suspect a SIM swap is already in progress: sudden, unexplained loss of mobile service calls and texts stop working is the first signal. Call your carrier immediately from another device and report the suspected swap. Every account tied to your phone number is at risk in the window before you recover it. Speed matters (ZDNet, April 2026).
What this means going forward
The Infrawatch findings 87 control panels, 94 physical farm locations, 17 countries, no meaningful buyer verification confirm that scam texts are generated by commercial infrastructure operating in a deliberate legal gray area. Enforcement takedowns have not disrupted the broader ecosystem. Consumer behavior and authentication hygiene remain the most reliable near-term defense (Help Net Security, April 2026).
The highest-value change is reducing dependence on SMS as a security layer. Removing SMS verification from critical accounts closes the vulnerability that both SIM farms and SIM swapping most directly exploit and it is something you can do this week, without waiting for any regulator to act (CISA, November 2025).
The UK's planned ban on SIM farm possession is a meaningful step, but the same network Infrawatch mapped spans 17 countries and 35 carriers. Regulatory catch-up will take years. Until then, treating every unexpected text as potentially fraudulent is not paranoia it is a proportionate response to infrastructure that now generates convincing fraud at industrial scale (ZDNet, April 2026).
For next steps: set your carrier account PIN, enroll in FIDO authentication on your most critical accounts, and know what to do if your SIM has already been swapped.