SMS 2FA isn’t security — it’s an illusion.
WWE star AJ Styles had two-factor authentication enabled.
It didn’t matter.
His X account was hijacked through a SIM swap — a common but devastating attack where hackers convince a mobile carrier to transfer your number to their SIM.
From there, they intercepted his 2FA codes and took control of his entire digital presence.
Racist tweets.
Crypto scam links.
Brand damage in real-time.
AJ later said:
“They stole my SIM card. Somebody at AT&T allowed it to happen.”
Let that sink in.
He did everything right — or so he thought.
But SMS-based 2FA didn’t protect him. It opened the door.
This isn’t rare.
It’s not bad luck.
It’s a broken system.
Here’s the hard truth:
- SMS 2FA can be socially engineered
- It depends on your mobile carrier’s weakest employee
- And once your number is stolen, every linked account is at risk
If you’re still using SMS for 2FA on high-value accounts — crypto, email, social, banking — you’re playing defense with a paper shield.
Here’s what to do instead:
- Use an app-based authenticator (like Authy or Google Authenticator)
- Better yet, use a physical security key (like YubiKey)
- Assume your number will be targeted — and plan accordingly
Because in 2025, SMS 2FA isn’t protection.
It’s a liability in disguise.



