{"id":24279,"date":"2018-05-01T01:00:15","date_gmt":"2018-05-01T07:00:15","guid":{"rendered":"https://www.webroot.com/blog/?p=24279"},"modified":"2024-03-06T14:26:08","modified_gmt":"2024-03-06T21:26:08","slug":"smishing-sms-phishing-scam-users-via-text-messages","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/05\/01\/smishing-sms-phishing-scam-users-via-text-messages\/","title":{"rendered":"\u2018Smishing\u2019: An Emerging Trend of Phishing Scams via Text Messages"},"content":{"rendered":"\n<p>Text messages are now a common way for people to engage with brands and services, with many now preferring texts over email. But today\u2019s scammers have taken a liking to text messages or smishing, too, and are now targeting victims with text message scams sent via shortcodes instead of traditional <a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-phishing\">email-based phishing attacks<\/a>.<\/p>\n\n\n\n<h2>What do we mean by shortcodes<\/h2>\n\n\n\n<p>Businesses typically use <a href=\"https:\/\/en.wikipedia.org\/wiki\/Short_code\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Short_code\">shortcodes <\/a>to send and receive text messages with customers. You\u2019ve probably used them before\u2014for instance, you may have received shipping information from FedEx via the shortcode \u201846339\u2019. Other shortcode uses include airline flight confirmations, identity verification, and routine account alerts. Shortcodes are typically four to six digits in the United States, but different countries have different formats and number designations.<\/p>\n\n\n\n<p>The benefits of shortcodes are fairly obvious. Texts can be more immediate and convenient, making it easier for customers to access links and interact with their favorite brands and services. One major drawback, however, is the potential to be scammed by a SMS-based phishing attack, or \u2018Smishing\u2019 attack. (Not surprisingly given the cybersecurity field\u2019s fondness for combining words, smishing is a combination of SMS and phishing.)<\/p>\n\n\n\n<h2>All the Dangers of Phishing Attacks, Little of the Awareness<\/h2>\n\n\n\n<p>The most obvious example of a smishing attack is a text message containing a link to <a href=\"https:\/\/www.webroot.com\/blog\/2018\/05\/15\/bad-apps-protect-your-smartphone-from-mobile-malware\/\" data-type=\"URL\" data-id=\"https:\/\/www.webroot.com\/blog\/2018\/05\/15\/bad-apps-protect-your-smartphone-from-mobile-malware\/\">mobile malware<\/a>. Mistakenly clicking on this type of link can lead to a malicious app being installed on your smartphone. Once installed, mobile malware can be used to log your keystrokes, steal your identity, or hold your valuable files for ransom. Many of the traditional dangers in opening emails and attachments from unknown senders are the same in smishing attacks, but many people are far less familiar with this type of attack and therefore less likely to be on guard against it.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" loading=\"lazy\" width=\"356\" height=\"633\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2018\/04\/Picture1.png\" alt=\"\" class=\"wp-image-24281\"\/><\/figure>\n\n\n\n<p><em>Text messages from shortcodes can contain links to malware and other dangers.<\/em><\/p>\n\n\n\n<h3>Smishing for Aid Dollars<\/h3>\n\n\n\n<p>Another possible risk in shortcodes is that sending a one-word response can trigger a transaction, allowing a charge to appear on your mobile carrier\u2019s bill. When a natural disaster strikes, it is common for charities to use shortcodes to make it incredibly easy to donate money to support relief efforts. For instance, if you text \u201cPREVENT\u201d to the shortcode 90999, you will donate $10 USD to the American Red Cross Disaster Relief Fund.<\/p>\n\n\n\n<p>But this also makes it incredibly easy for a scammer to tell you to text \u201cMONSOON\u201d to a shortcode number while posing as a legitimate organization. These types of smishing scams can lead to costly fraudulent charges on your phone bill, not to mention erode aid agencies ability to solicit legitimate donations from a wary public.<\/p>\n\n\n\n<p>Another common smishing technique happens during tax-filing season and involves IRS-themed requests for the taxpayer to update personal and financial information. An uptick in these scams after the pandemic <a href=\"https:\/\/www.ic3.gov\/Media\/Y2022\/PSA221004\" data-type=\"URL\" data-id=\"https:\/\/www.ic3.gov\/Media\/Y2022\/PSA221004\" target=\"_blank\" rel=\"noreferrer noopener\">prompted the FBI to post public warnings<\/a>. <\/p>\n\n\n\n<h2>Protect yourself from Smishing Attacks<\/h2>\n\n\n\n<p>While a <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/mobile\">trusted mobile security app<\/a> can help you stay protected from a variety of mobile threats, avoiding smishing attacks demands a healthy dose of cyber awareness. Be skeptical of any text messages you receive from unknown senders and assume messages are risky until you are sure you know the sender or are expecting the message. Context is also very important. If a contact\u2019s phone is lost or stolen, that contact can be impersonated. Make sure the message makes sense coming from that contact.<\/p>\n\n\n\n<p><strong>Related Resources:<\/strong><br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.webroot.com\/blog\/2019\/09\/16\/smishing-explained-what-it-is-and-how-you-can-prevent-it\/\" data-type=\"URL\" data-id=\"https:\/\/www.webroot.com\/blog\/2019\/09\/16\/smishing-explained-what-it-is-and-how-you-can-prevent-it\/\" target=\"_blank\">Webroot blog: Smishing Explained: What It Is and How to Prevent It<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.webroot.com\/blog\/2020\/04\/16\/whats-behind-the-surge-in-phishing-sites-three-theories\/\" data-type=\"URL\" data-id=\"https:\/\/www.webroot.com\/blog\/2020\/04\/16\/whats-behind-the-surge-in-phishing-sites-three-theories\/\" target=\"_blank\" rel=\"noreferrer noopener\">Webroot blog: What\u2019s Behind the Surge in Phishing Sites? Three Theories<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Text messages are now a common way for people to engage with brands and services, with many now preferring texts over email. But today\u2019s scammers have taken a liking to text messages or smishing, too, and are now targeting victims with text message scams sent via shortcodes instead of traditional email-based phishing attacks. What do [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":32759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005,2985],"tags":[21932,21937,21942],"yst_prominent_words":[3563,3565,11615,22109,4431,6675,3523,10021,3539,3543,22121,22111,22119,22115,22107,4269,22113,22105,10461,22117],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24279"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=24279"}],"version-history":[{"count":10,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24279\/revisions"}],"predecessor-version":[{"id":32761,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24279\/revisions\/32761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/32759"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=24279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=24279"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=24279"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=24279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}