While most phishing campaigns involve email, SMS text messages are an ideal alternative for attackers, according to Paul Ducklin at Naked Security. Text messages are brief and uniform in appearance, so there aren’t many indicators to raise suspicion. They also come from a phone number rather than an email address, so the recipient can’t examine the address for signs of illegitimacy. Additionally, legitimate text messages frequently make use of shortened, strange-looking links, so recipients are less inclined to be suspicious of an unfamiliar URL.
SMS phishing (or “Smishing”) campaigns often impersonate mobile phone providers, since people are expecting to receive these types of texts. Ducklin cites one example in which the scammers sent text messages purporting to come from EE, one of Britain’s largest mobile providers. The messages told recipients that they needed to update their billing information, and included a link to a phishing page. The URL of the page began with subdomains that mimicked EE’s legitimate website.
Ducklin notes that the scammers didn’t need to target this campaign, since they could get a rough idea of phone numbers based in the UK, and a decent amount of these would be EE customers. Presumably, enough people will fall for the scam that the attackers will probably make far more money than it cost to send out thousands of SMS messages.
Scammers will take advantage of any venue they can use to trick people into giving them data or money. New-school security awareness training can help your employees avoid falling victim to these attacks.