Have you’ve heard of Phishing. This is a cybercrime that uses scam emails to defraud users into giving away sensitive personal information such as passwords or financial details. With the advent of text messaging, a variant that uses texts instead of emails has made its way to the digital universe.
Smishing, SMS + Phishing = Smishing, is now overtaking Phishing as one of the most effective scamming tools in the bad actor’s cybercrime toolkit.
Smishing uses fake SMS (mobile
Remember the last time you’ve interacted with a brand, political cause, or fundraising campaign via text message? You probably have noticed these communications are occurring far more frequently. It’s no accident. There is mounting evidence that email opens or users accepting push notifications from apps are no longer effective tools to cause users to act. But 98% of SMS messages are read within seconds of being received. Cybercriminals are many things, but stupid is not one of them. They follow user behavior and patterns, and they adjust their attacks (social engineering) to the ones that work the best. Smishing is now a leading technique for scamming, and the bad actors are ramping up their attacks.
There is a psychology behind Smishing
With the world quickly going to a mobile-dominated world, the more prevalent scams like Smishing will become. Evidence shows people have gotten used to and smarter about email spam, but they are also showing signs they are less likely to doubt an SMS message’s legitimacy.
The Smishing scammers rely on your quick reaction to a message that may appear identical to an actual message from, for example, your credit card company. Like many “in your face” scams, one of the primary techniques the bad actors use is to create “URGENCY.” So, they use message titles that indicate the need for an immediate response, such as – “Urgent!” or “Reply now!”. The less you think, or quicker you respond, the better it is for the scammers. But, even if you give the message a good look-over, it’s still possible you could be fooled.
The end goal is to trick a user into an action that plays into the hands of cybercriminals. Smishing campaigns, in particular, often follow natural disasters as scammers try to prey on people’s charitable nature to scam those funds into their own pockets.
Smishy phone numbers.
Some smishes may come from strange
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
How to prevent being Smished
New and innovative technology is great, but it has also created more ways to be ripped off. If a text message, from an unknown number promising to get rid of your car loan (but only if you act fast), hits your
Here are some other good practices to avoid these attacks:
- Use your Spidey sense.
-
- Check for spelling errors and grammar mistakes
- Go to the sender’s website rather than responding to the message
- Verify the sender’s telephone number to make sure it matches that of the company it suggests it belongs to
- NEVER provide financial or payment information on any app or Site that you are not 100% sure is trustworthy.
- NEVER click on links from unknown senders or those you do not trust.
- DO NOT trust “act fast,” “sign up now,” “you’re a winner,” or any other aggressive and “too good to be true” offers.
- Type web addresses into your device’s browser rather than clicking on the link.
- Install a mobile-compatible quality
antivirus /antimalware tool on your smart devices.
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
Recommended Reading
What is a DDoS (Distributed Denial of Service) Attack?
DDoS attack or Distributed Denial of Service, is a coordinated attack intended to crash and make unavailable targeted websites and online systems by overwhelming them with data.
What is 256 Bit Encryption?
256 bit encryption has quickly become the industry standard for ensuring security of your data, security of your communication and is really now minimum encryption level for securing your digital environment.
What to Do if You’ve Fallen Victim to a Phishing Attack
Cybercriminals target phishing scam attempts on fatigued workers in the hopes of catching them off guard with an attention-getting email. They also launch phishing schemes against unsuspecting individual users by using fear and intimidation. And it sometimes works.
What is Catfishing?
Catfishing is a deceptive technique individuals or criminal entities use to create a fictional personas or fake identities online and use them to scam unwitting victims.
Strong Passwords. One giant step to protect our digital lives
Here's how to create long, complex, and unique passwords to protect your accounts and keep your sensitive info safe from hackers.
What is a zero-day threat?
A zero day threat is a security flaw known or unknown to the software vendor which hasn't had a patch made to fix the vulnerability.