The process typically begins when the perpetrator contacts the victim’s telecom service provider, impersonating the victim by using information gathered from various sources, such as social media. They may claim to have lost their phone or need to switch to a new device. By manipulating customer support representatives through social engineering techniques, they convince the service provider to transfer the victim’s phone number to a new SIM card controlled by the criminal. Once the transfer is complete, the victim’s phone loses network service, and the criminal gains control over all calls, messages, and notifications sent to the victim’s phone number.