Mobile Computing.com

smishing (SMS phishing)

By Kinza Yasar

What is smishing?

Smishing -- or SMS (Short Message Service) phishing -- is a social engineering tactic cybercriminals use to trick people into divulging sensitive information over text messages.

A type of phishing attack, smishing often involves sending bogus text messages that appear to come from a legitimate source, such as a bank or a social media site. Most messages have a sense of urgency and request the recipient click on a link or reply with personal information.

How does smishing work?

Smishing attacks can range in sophistication, making some of them harder to spot than others. These attacks can be delivered through both conventional text messaging and non-SMS messaging apps, such as WhatsApp, Viber or Snapchat.

Typically, smishing attacks work in the following way:

  1. The attacker sends a victim a smishing text message that seems to come from a legitimate source, such as a government agency, bank or well-known business.
  2. The message delivers a sense of urgency and compels the victim to take immediate action, such as clicking on a link or calling a phone number.
  3. Once the victim opens and clicks on the link or dials the phone number listed in the message, they're taken to a fraudulent website or a mobile phone line that's designed to resemble a legitimate source.
  4. The victim might be asked to enter sensitive information, such as login credentials, social security numbers, credit card information or personal identification numbers (PINs). Once the victim's sensitive information is divulged, the attacker might steal it to commit fraud for personal gain or to compromise the victim's device by installing malware on it.
  5. In some instances, the victim is directed to call a phone number where they're prompted to provide personal details or banking information or respond to automated prompts.

Why attackers run smishing scams

Scammers use smishing attacks as a reasonably quick and efficient way to obtain sensitive data or deploy malware.

The following are some common reasons why attackers use smishing attacks:

Types of smishing attacks

The following are some common types of smishing attacks:

How to defend against smishing attacks

Smishing and other mobile threats are on the rise as more people use mobile devices for online activities. Therefore, it's important to exercise caution and verify the authenticity of any unusual messages.

The following measures can mitigate smishing and other types of cyber attacks:

Actions to take if you are a victim of a smishing attack

Prevention is key when it comes to cybersecurity and smishing attacks. If a smishing attack happens even after implementing the above protections, a victim can take the following steps to mitigate the damage:

  1. Inform your wireless carrier and any financial institutions that can assist with the suspected attack.
  2. Put a hold with the credit card company on the card in question to prevent future or ongoing identity theft.
  3. Reset all passwords and bank account PINs as often as feasible.
  4. Monitor finances, credit and internet accounts for strange login locations and bizarre activities.
  5. Educate and read up on how to detect and respond to smishing to prevent future attacks.
  6. Scan the system for viruses and malware.
  7. Set up a fraud alert. Most major institutions, such as Experian, Equifax and TransUnion, offer a free 90-day fraud alert that's placed on a person's credit report. Setting up a fraud alert makes it difficult for attackers to create an account in a victim's name.
  8. Send suspicious or spam messages to 7726, which spells SPAM. This service is available to subscribers of carriers such as Verizon, AT&T and T-Mobile.

Smishing, or text-based phishing, is a growing concern for individuals and organizations. Discover the dangers of mobile phishing and explore ways to mitigate it.

25 Apr 2023

All Rights Reserved, Copyright 2003 - 2024, TechTarget | Read our Privacy Statement