What is Smishing and How to Defend Against it? (2024)

Smishing meaning and definition

Smishing is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing.

As a variant of phishing, victims are deceived into giving sensitive information to a disguised attacker. SMS phishing can be assisted by malware or fraud websites. It occurs on many mobile text messaging platforms, including non-SMS channels like data-based mobile messaging apps.

What is Smishing?

As the definition of smishing suggests, the term combines "SMS" (short message services, better known as texting) and "phishing." To further define smishing, it is categorized as a type of social engineering attack that relies on exploiting human trust rather than technical exploits.

When cybercriminals "phish," they send fraudulent emails that seek to trick the recipient into clicking on a malicious link. Smishing simply uses text messages instead of email.

In essence, these cybercriminals are out to steal your personal data, which they can then use to commit fraud or other cybercrimes. Typically, this includes stealing money — usually yours, but sometimes also your company’s money.

Cybercriminals often use one of two methods to steal this data:

  1. Malware: The smishing URL link might trick you into downloading malware — malicious software — that installs itself on your phone. This SMS malware might masquerade as a legitimate app, tricking you into typing in confidential information and sending this data to the cybercriminals.
  2. Malicious website: The link in the smishing message might lead to a fake site that requests you to type sensitive personal information. Cybercriminals use custom-made malicious sites designed to mimic reputable ones, making it easier to steal your information.

Smishing text messages are often purporting to be from your bank, asking you for personal or financial information such as your account or ATM number. Providing the information is equivalent to handing thieves the keys to your bank balance.

As more and more people use their personal smartphones for work (a trend called BYOD, or "bring your own device") smishing is becoming a business threat as well as a consumer threat. So, it should come as no surprise that smishing has become the leading form of malicious text messages.

Cybercrime aimed at mobile devices is rising, just as mobile device usage is. Aside from texting being the most common use of smartphones, a few other factors make this a particularly insidious security threat. To explain, let’s unpack how smishing attacks work.

How does Smishing work?

Deception and fraud are the core components of any SMS phishing attack. As the attacker assumes an identity that you might trust, you are more likely to succumb to their requests.

Social engineering principles allow smishing attackers to manipulate a victim’s decision-making. The driving factors of this deception are three-fold:

  1. Trust: By posing as legitimate individuals and organizations, cybercriminals lower their target’s skepticism. SMS texts, as a more personal communication channel, also naturally lower a person’s defenses against threats.
  2. Context: Using a situation that could be relevant to targets allows an attacker to build an effective disguise. The message feels personalized, which helps it override any suspicion that it might be spam.
  3. Emotion: By heightening a target’s emotions, attackers can override their target’s critical thinking and spur them into rapid action.

Using these methods, attackers write messages that will get a recipient to take action.

Typically, attackers want the recipient to open a URL link within the text message, where they then are led to a phishing tool prompting them to disclose their private information. This phishing tool often comes in the form of a website or app that also poses under a false identity.

Targets are selected in many ways but usually are based on their affiliation to an organization or a regional location. Employees or customers of a specific institution, mobile network subscribers, university students, and even residents of a given area can be targets.

An attacker’s disguise is usually related to the institution they wish to gain access to. However, it can just as easily be any mask that will help them acquire your identity or financial information.

Using a method known as spoofing, an attacker can hide their true phone number behind a decoy. Smishing attackers may also use “burner phones” — cheap, disposable prepaid phones — to further mask the origin of the attack. Attackers are known to use email-to-text services as another means of hiding their numbers.

Step-by-step, an attacker, will carry out their attack in a few key phases:

  • Distribution of the text message “bait” to targets.
  • Compromising the victim’s information via deception.
  • Execution of the desired theft using the victims’ compromised information.

An attacker’s smishing scheme is successful once they’ve used your private information to commit the theft they aimed for. This goal could include but is not limited to directly stealing from a bank account, committing identity fraud to illegally open credit cards, or leaking private corporate data.

What is Smishing and How to Defend Against it? (1)

How does Smishing spread?

As stated earlier, smishing attacks are delivered through both traditional text messaging and non-SMS messaging apps. However, SMS phishing attacks primarily spread uninterrupted and unnoticed due to their deceptive nature.

Smishing deception is enhanced due to users having false confidence in text message safety.

Firstly, most people know about the risks of email fraud. You’ve probably learned to be suspicious of generic emails that say "Hi—check out this link." The exclusion of an authentic personal message tends to be a substantial red flag of email spam scams.

When people are on their phones, they are less wary. Many assume that their smartphones are more secure than computers. But smartphone security has limitations and cannot always directly protect against smishing.

Regardless of the means being used, these schemes ultimately require very little beyond your trust and a lapse in judgment to succeed. As a result, smishing can attack any mobile device with text messaging capabilities.

While Android devices are the market majority platform and an ideal target for malware text messages, iOS devices are equal opportunity targets. Apple’s iOS mobile technology has a good reputation for security, but no mobile operating system can by itself protect you from phishing-style attacks. A false sense of security can leave users especially vulnerable, regardless of platform.

Another risk factor is that you use your smartphone on the go, often when you’re distracted or in a hurry. This means you’re more likely to get caught with your guard down and respond without thinking when you receive a message asking for bank information or to redeem a coupon.

Types of Smishing attacks

Each smishing attack uses similar methods, while the presentation may vary significantly. Attackers can use a wide variety of identities and premises to keep these SMS attacks fresh.

Unfortunately, a comprehensive list of smishing types nearly impossible due to the endless reinvention of these attacks. Using a few established scam premises, we can unveil characteristics to help you spot a smishing attack before you become a victim.

Here are some common premises of smishing attacks:

COVID-19 Smishing

COVID-19 smishing scams are based on legitimate aid programs designed by government, healthcare, and financial organizations for recovery from the COVID-19 pandemic.

Attackers have used these schemes to manipulate victims’ health and finance fears for committing fraud. Warning signs can include:

  • Contact tracing that asks for sensitive info (social security number, credit card number, etc.)
  • Tax-based financial relief like stimulus checks.
  • Public health safety updates.
  • Requests to complete the U.S. Census.

Financial Services Smishing

Financial services smishing attacks are masked as notifications from financial institutions. Nearly everyone uses banking and credit card services, making them susceptible to both generic and institution-specific messages. Loans and investing are also common premises in this category.

An attacker poses as a bank or other financial institution for an ideal disguise to commit financial fraud. Features of a financial services smishing scam may include an urgent request to unlock your account, being asked to verify suspicious account activity, and more.

Gift Smishing

Gift smishing suggests the promise of free services or products, often from a reputable retailer or other company. These can be giveaway contests, shopping rewards, or any number of other free offers. When an attacker elevates your excitement by proposing the idea of “free,” this serves as a logic override to get you to take action faster. Signs of this attack can include limited time offers or exclusive selection for a free gift card.

Invoice or Order Confirmation Smishing

Confirmation smishing involves a false confirmation of a recent purchase or billing invoice for a service. A link may be provided for a follow-up to manipulate your curiosity or prompt immediate action to trigger fear of unwanted charges. Evidence of this scam may involve strings of order confirmation texts or the absence of a business name.

Customer Support Smishing

Customer support smishing attackers pose as a trusted company’s support representative to help you resolve an issue. High-use tech and e-commerce companies like Apple, Google, and Amazon are effective disguises for attackers in this premise.

Typically, an attacker will claim there is an error with your account and give you steps to resolve it. The request can be as simple as using a fraudulent login page, while more complex schemes may ask you to provide a real account recovery code in an attempt to reset your password. Warnings of a support-based smishing scheme include an issue with billing, account access, unusual activity, or resolving your recent customer complaint.

Smishing examples

With SMS being available to nearly everyone with a mobile phone, smishing attacks have been known to occur globally. Here are some smishing attack examples to be aware of.

Early Access Apple iPhone 12 Scam — Order Confirm & Gift Smishing

In September 2020, a smishing campaign surfaced to bait people into providing credit card info for a free iPhone 12.

The scheme uses an order confirmation premise, in which the text message claims a package delivery has been sent to an incorrect address. The in-text URL link sends targets to a phishing tool posing as an Apple chatbot. The tool guides the victim through a process to claim their free iPhone 12 as part of an early access trial program but inevitably asks for credit card info to cover a small shipping fee.

USPS and FedEx Scams — Order Confirmation & Gift Smishing

In September 2020, reports of a false USPS and FedEx package delivery SMS scam began circulating. This smishing attack may attempt to steal your account credentials for various services or your credit card information.

The messages led with a claim of missed or incorrect package delivery and provide a link to a website phishing tool pretending to be a FedEx or USPS giveaway survey. While the premise of these phishing sites may vary, many have been identified as attempting to gather account logins for services like Google.

Mandatory Online COVID-19 Test Scam — COVID-19 Smishing

In April 2020, the Better Business Bureau received a rise in reports of U.S. government impersonators sending text messages asking people to take a mandatory COVID-19 test via a linked website.

Of course, many have instantly spotted this scam since there is no online test for COVID-19. However, the premise of these smishing attacks may easily evolve as preying on pandemic fears is an effective method of victimizing the public.

How to prevent Smishing

The good news is that the potential ramifications of these attacks are easy to protect against. You can keep yourself safe by doing nothing at all. In essence, the attacks can only do damage if you take the bait.

That said, be mindful that text messaging is a legitimate means for many retailers and institutions to reach you. Not all messages should be ignored, but you should act safely regardless.

There are a few things to keep in mind that will help you protect yourself against these attacks.

  • Do not respond. Even prompts to reply like texting “STOP” to unsubscribe can be a trick to identify active phone numbers. Attackers depend on your curiosity or anxiety over the situation at hand, but you can refuse to engage.
  • Slow down if a message is urgent. You should approach urgent account updates and limited time offers as caution signs of possible smishing. Remain skeptical and proceed carefully.
  • Call your bank or merchant directly if doubtful. Legitimate institutions don’t request account updates or login info via text. Furthermore, any urgent notices can be verified directly on your online accounts or via an official phone helpline.
  • Avoid using any links or contact info in the message. Avoid using links or contact info in messages that make you uncomfortable. Go directly to official contact channels when you can.
  • Check the phone number. Odd-looking phone numbers, such as 4-digit ones, can be evidence of email-to-text services. This is one of many tactics a scammer can use to mask their true phone number.
  • Opt to never keep credit card numbers on your phone. The best way to keep financial information from being stolen from a digital wallet is to never put it there.
  • Use multi-factor authentication (MFA). An exposed password may still be useless to a smishing attacker if the account being breached requires a second “key” for verification. MFA’s most common variant is two-factor authentication (2FA), which often uses a text message verification code. Stronger variants include using a dedicated app for verification (like Google Authenticator) are available.
  • Never provide a password or account recovery code via text. Both passwords and text message two-factor authentication (2FA) recovery codes can compromise your account in the wrong hands. Never give this information to anyone, and only use it on official sites.
  • Download an anti-malware app. Products like Kaspersky Internet Security for Android can protect against malicious apps, as well as SMS phishing links themselves.
  • Report all SMS phishing attempts to designated authorities.

Remember that, like email phishing, smishing is a crime of trickery — it depends on fooling the victim into cooperating by clicking a link or providing information. The simplest protection against these attacks is to do nothing at all. If you don’t respond, a malicious text cannot do anything.

What to do if you become a victim of Smishing

Smishing attacks are cunning and may have already victimized you, so you’ll need to have a recovery plan in place.

Take these important actions to limit the damage of a successful smishing attempt:

  1. Report the suspected attack to any institutions that could assist.
  2. Freeze your credit to prevent any future or ongoing identity fraud.
  3. Change all passwords and account PINs where possible.
  4. Monitor finances, credit, and various online accounts for strange login locations and other activities.

Each of these steps has a substantial weight for your protection after a smishing attack. However, reporting an attack not only helps you recover, but keeps others from falling victim as well.

Related Links:

  • Are e-Transfers safe?
  • What to Do If Your Email Account Gets Hacked?
  • Coronavirus charity scams
  • Mobile scams - how to identify them and protect yourself
What is Smishing and How to Defend Against it? (2024)

FAQs

What is Smishing and How to Defend Against it? ›

Remember that, like email phishing, smishing is a crime of trickery — it depends on fooling the victim into cooperating by clicking a link or providing information. The simplest protection against these attacks is to do nothing at all.

What happens if you click on a smishing text? ›

Clicking a phishing link in a spam text message can open your phone to security threats. If you don't enter any information or accept any downloads, your data may be safe. On the other hand, it's possible that suspicious files and malware were downloaded to your device through that malicious link.

How do you respond to smishing? ›

Things you can do to avoid being a victim of a smishing attempt include: Never click links, reply to text messages or call numbers you don't recognize. Do not respond, even if the message requests that you "text STOP" to end messages.

Does Iphone protect against smishing? ›

As a result, smishing can attack any mobile device with text messaging capabilities. While Android devices are the market majority platform and an ideal target for malware text messages, iOS devices are equal opportunity targets.

What is a smishing trick? ›

Smishing is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to cybercriminals. The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind text messages—and “phishing.”

Can a scammer hack my phone if I reply to a text? ›

No, you cannot get hacked by replying to a scam text, but you can get hacked from a scam text if you click on a malicious link the scammer sends you.

What does a smishing text look like? ›

Based on some of the most common types of smishing schemes, below are additional examples of how smishers craft these text messages. Banking Scams: “Dear [Bank Name] customer, we've detected unusual activity on your account. Please click the link to verify your transactions: [malicious link].”

What if I clicked on a phishing link but did not enter details? ›

Even if you clicked on a phishing link but didn't enter any information, you are still at risk, as the link may have been used to deploy malware or spyware on your device.

How to block a text without opening it? ›

Blocking text messages on Android

Step 2: Press and hold over a message from someone you want to block. Step 3: In the context menu that appears, select the Three dots on the right. Step 4: Tap Block. Step 5: Alternatively, if you allow the message to open, you can select the Three dots in the upper right corner.

What is the difference between smishing and phishing? ›

Get familiar with these terms: Phishing: fraudulent e-mails and websites meant to steal data. Vishing: fraudulent phone calls that induce you to reveal personal information. Smishing: fraudulent text messages meant to trick you into revealing data.

How do you get a scammer to stop texting you? ›

Tips for avoiding unwanted texts

Several mobile service providers allow you to block the sender by forwarding unwanted texts to 7726 (or "SPAM"). Check with your provider about options. Be careful about giving out your mobile phone number or any other personal information.

What is a real life example of smishing? ›

What is an example of a smishing attack? An example of such an attack is a Message that contains a link to a fake website, which looks like an official bank website, but is actually a phishing page designed to steal the victim's credentials.

Can someone steal my information through a text message? ›

You can't get hacked by simply replying to a text. However, engaging with a hacker in any way will make it more likely that you get hacked. They'll find a way to fool you and make you click a link, which is what leads to you getting hacked.

How can I protect myself from phone phishing? ›

Don't open suspicious links. Check the email address of the sender. Remember, no reputable company or authority will ask for personal information through email or SMS. If you receive a suspicious text message, check if it's safe for free with F‑Secure Text Message Checker.

Top Articles
Latest Posts
Article information

Author: Ms. Lucile Johns

Last Updated:

Views: 5903

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Ms. Lucile Johns

Birthday: 1999-11-16

Address: Suite 237 56046 Walsh Coves, West Enid, VT 46557

Phone: +59115435987187

Job: Education Supervisor

Hobby: Genealogy, Stone skipping, Skydiving, Nordic skating, Couponing, Coloring, Gardening

Introduction: My name is Ms. Lucile Johns, I am a successful, friendly, friendly, homely, adventurous, handsome, delightful person who loves writing and wants to share my knowledge and understanding with you.