What is "Sim Swapping"?
As the name suggests, it is about swapping the SIM, the smart card contained in your phone and containing various secrets allowing you to connect to the GSM network of your operator, as well as to authenticate yourself.
There are many techniques, but basically, the most obvious technique is to call the support of the target's phone operator, pretend to be this person and ask to be sent a new SIM card following a theft, a loss...
There are also techniques with e-SIM, which do not require sending a smart card.
In general, it is still necessary to have some information and access beforehand, such as personal information, access to the target's email...
Once in possession of the new SIM card, it is like having the target's phone. Knowing that many password reset procedures are based on the phone number, it is therefore possible (in some cases) to reset the target's password and then receive the codes used for strong authentication by SMS.
You will find many articles on the Internet detailing this technique:
https://www.zdnet.fr/actualites/sim-swapping-les-manoeuvres-des-operateurs-francais-pour-limiter-les-risques-39901345.htm
https://www.blackhatethicalhacking.com/news/europol-arrests-26-sim-swapping-fraudsters-for-stealing-over-3-million/
How to prevent it ?
Directly, it is rather complicated to protect oneself against it because it is with the operator that it happens.
On "professional" mobile fleets, it may be requested that a single contact person make this type of request with validation by email or other specific process.
On personal subscriptions, apart from choosing an operator that does serious checks, I don't have a solution (nor a list of operators 😉 ). I can only recommend to have strong and different passwords everywhere, dedicated and unique mails for each service, to respect good security practices, not to publish private or sensitive information about yourself in social networks...
How to detect it?
It is also difficult to detect the problem apart from making people aware of this type of attack, because once the "SIM Swapp" is done, the user loses his phone line, which should arouse suspicion.