When a cybercriminal gains control of a victims’ phone number and routes SMS text messages and calls to other devices owned by the attacker.