π± Dual-SIM Defense
Block Cellular Attacks with Physical SIM
Force your Android device into a non-attach cellular state using an inactive physical SIM card. Block eSIM attacks, stabilize compromised devices, and preserve dataβall without factory reset or warranty void.
Why This Matters
When your Android device is compromised or behaving strangely, you face a difficult choice: factory reset and lose all your data, or keep using a potentially dangerous device. This technique gives you a third option.
The Dual-SIM Defense technique:
- Blocks cellular attacks: Forces device into non-attach state, severing attacker command-and-control
- Preserves WiFi: You can still connect to controlled networks for data backup
- Enables USB access: Stabilizes data transfer that may have been blocked
- No factory reset needed: Keeps all your data intact for investigation
- Completely reversible: Just remove the dummy SIM to restore normal function
- No warranty void: Unlike sideloading apps, this is a normal hardware feature
β Battle-Tested
This technique was discovered during real-world incident response when a compromised Android device exhibited:
- β Repeated failure to export data via cloud services
- β Unreliable or non-functional USB data transfer
- β Inconsistent or blocked ADB / developer access
After inserting an inactive physical SIM:
- β USB data transfer worked consistently and perfectly
- β Previously inaccessible data paths became available
- β Device stabilized for backup and analysis
How It Works
Modern Android devices with eSIM and dual-SIM support have complex baseband logic for:
- Modem provisioning: How the device connects to cellular networks
- Subscription arbitration: Which SIM gets priority
- Network attachment: The actual connection to cell towers
When you insert an inactive physical SIM alongside an active eSIM, the device's modem gets confused. It tries to provision both SIMs but can't attach cleanly to cellular service. This forces the device into a persistent non-attach cellular state.

π¬ Technical Explanation
This works at the baseband layerβbelow where most malware operates. Even sophisticated spyware running at the application level can't bypass this because the modem itself is in a non-attach state.
Key advantage: Treats the cellular interface as untrusted while preserving WiFi functionality. No assumptions about the cause of compromise are required.
What You'll Need
- Android device with eSIM + physical SIM slot: Most modern Android phones (Pixel, Samsung Galaxy, etc.)
- An old, inactive physical SIM card: Any carrier, any ageβit doesn't need to be active
- 2 minutes: That's it
π± Compatible Devices
This technique works on any Android device that supports:
- eSIM (virtual SIM)
- Physical SIM card slot
- Dual-SIM functionality
Examples: Google Pixel 3 and newer, Samsung Galaxy S20 and newer, OnePlus 8 and newer
β οΈ Don't Have an Old SIM Card?
You can get a prepaid SIM card from any carrier for $1-10. You don't need to activate itβjust insert the physical card.
Step-by-Step Instructions
Locate Your SIM Card Tray
Find the SIM card tray on your Android device. It's usually on the side or top of the phone. You'll need the SIM ejector tool (small pin) that came with your phone, or a paperclip.
β Tip: The SIM tray has a tiny hole next to it for the ejector tool
Eject the SIM Tray
Insert the SIM ejector tool (or straightened paperclip) into the small hole next to the SIM tray. Push gently until the tray pops out.
Insert the Inactive Physical SIM
Place your old, inactive SIM card into the physical SIM slot on the tray. Make sure it's oriented correctly (the corner cutout should match the tray shape).
π‘ Important
Leave your eSIM active. Do NOT disable or remove your eSIM. The technique requires BOTH an active eSIM and an inactive physical SIM to work.
Reinsert the SIM Tray
Carefully push the SIM tray back into the phone until it clicks into place.
Observe the Non-Attach State
Your phone will now attempt to provision both SIMs. You'll likely see:
- No cellular signal bars (or "No service")
- WiFi still works normally
- USB data transfer becomes more stable
- Cloud export may start working again
β Success!
Your device is now in a non-attach cellular state. The cellular interface is isolated, but WiFi and USB remain functional. You can now backup your data over WiFi or USB without cellular interference.
What This Achieves
β Cellular Isolation
Your device cannot attach to cellular networks. This severs any command-and-control channels that rely on cellular data, including:
- eSIM-based attacks
- Remote SIM provisioning exploits
- Cellular data exfiltration
- SMS-based C2 channels
β Preserved Functionality
Unlike airplane mode or SIM removal, this technique preserves:
- WiFi connectivity: Connect to controlled networks for backup
- USB data transfer: Often becomes MORE stable after cellular isolation
- Bluetooth: Still works for peripherals
- All your data: No factory reset needed
β Reversibility
To restore normal cellular function:
- Eject the SIM tray
- Remove the inactive physical SIM
- Reinsert the tray
- Your eSIM will resume normal operation
When to Use This Technique
π¨ Suspected Device Compromise
If your device is exhibiting signs of compromise:
- Unexplained data usage
- Battery draining quickly
- Device getting hot when idle
- Strange network activity
- Failed data export attempts
πΎ Before Factory Reset
Use this technique to stabilize the device and backup your data BEFORE doing a factory reset. This gives you:
- Time to extract important data
- Ability to investigate what happened
- Evidence preservation for potential legal action
π Forensic Investigation
Security professionals can use this to:
- Isolate compromised devices without destroying evidence
- Enable controlled data extraction over WiFi/USB
- Prevent further attacker activity during investigation
β οΈ This is NOT a Permanent Solution
Dual-SIM defense is a temporary stabilization technique. It buys you time to backup data and investigate, but you should still:
- Check for spyware (Guide #9)
- Consider a factory reset (Guide #10)
- Harden your Google Account (Guide #12)
- Review app permissions (Guide #4)
Advantages Over Other Methods
vs. Airplane Mode
- β Dual-SIM: Works at baseband layer, can't be bypassed by malware
- β Airplane mode: Can be toggled by sophisticated malware
vs. SIM Removal
- β Dual-SIM: Doesn't trigger SIM removal detection in advanced malware
- β SIM removal: May trigger anti-forensic mechanisms
vs. Factory Reset
- β Dual-SIM: Preserves all data and evidence
- β Factory reset: Destroys everything, no recovery possible
vs. Firewall Apps (NetGuard, etc.)
- β Dual-SIM: No warranty void, no sideloading required
- β Firewall apps: May void warranty, require F-Droid installation
Troubleshooting
β My phone still has cellular signal
This can happen if:
- The physical SIM is actually active (try a different, older SIM)
- Your device doesn't support dual-SIM properly
- The eSIM was disabled instead of left active
Solution: Make sure the physical SIM is truly inactive and the eSIM is still enabled.
β WiFi stopped working
WiFi should NOT be affected by this technique. If WiFi stops working:
- Check that you didn't accidentally enable airplane mode
- Restart your device
- Remove the physical SIM and try again
β I don't have an old SIM card
You can:
- Buy a prepaid SIM for $1-10 (don't activate it)
- Ask friends/family for old SIM cards they're not using
- Visit a carrier store and ask for a SIM card (often free)
β My device doesn't have a physical SIM slot
Some newer devices (iPhone 14 in the US, some Pixel models) are eSIM-only with no physical SIM slot. This technique won't work on those devices. Instead:
- Use airplane mode + WiFi
- Use PCAPdroid to monitor network activity (Guide #2)
- Consider a Faraday bag for complete isolation (Guide #8)
Next Steps
After using Dual-SIM defense to stabilize your device and backup your data:
- Check for spyware: Investigate what caused the compromise β Guide #9: Check for Spyware
- Monitor network activity: Use PCAPdroid to see what apps are doing β Guide #2: Install PCAPdroid
- Factory reset if needed: If spyware is found, start fresh β Guide #10: Factory Reset
- Harden your account: Prevent future compromises β Guide #12: Google Account Security
π‘οΈ Defense in Depth
Dual-SIM defense is one layer of protection. Combine it with:
- Disable 2G (Guide #1)
- Network monitoring with PCAPdroid (Guide #2)
- App permission audits (Guide #4)
- Privacy settings hardening (Guide #5)
- Strong PIN and lock screen (Guide #7)
Together, these create a comprehensive defense against mobile threats.
