- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
You are probably familiar with “phishing”. Fraudsters try to lure unsuspecting Internet users to manipulated Internet sites using bogus e-mails. Anyone who types in access data or passwords here has fallen into the trap. Smishing is the mobile version of this scam, meaning fraudulent text messages intended to trick victims. Learn how it works and how to protect yourself in this article.
Have
you ever received a text message from a well-known transportation company that
you didn't question for a second? Why should you? After all, we order
so much online these days and with so many delivery notifications you don't
always look too closely. But you should. Because behind this could be
a so-called smishing message. This is a modified form of phishing.
Smishing, the Mobile Brother of Phishing
Figuratively
speaking, phishing messages are used to “fish”, ie to steal passwords or other
access data. To do this, the phishing scammers send fake e-mails that are
made up as if they came from a customer advisor at a bank. For a flimsy
reason, they guide the recipient to a fake website, where they are asked to
type in an account number, password (PIN), and transaction number (TAN), for
example, for verification purposes. If that happens, the fraudsters will
empty the account.
SMS Fraud
Smishing
relies on the same principle, but the fraudsters do not use e-mails for
manipulation, but rather short messages such as SMS. Hence the name is made up of SMS and phishing. Such short messages contain, for example,
links that lead to the download of malware, which in turn, for example, give
attackers access to smartphones, read out login data or lock the device and
then demand money for unlocking. Requests to report to a specific
telephone number are also common. In this case, there are either expensive
tapes or trained perpetrators who try to extract personal information from the
victims. Or there is a traditional link to a fake website into which the
victim is supposed to enter personal data.
Typical Smishing Stitches
Back
to parcel tracking, for example, Victims receive a text message that supposedly
comes from DHL and contains a link for parcel tracking. However, behind
the link there is, for example, a page for accessing credit card data. More
smishing stitches:
- A bank reports unusual account movements
- Confirmation for the conclusion of a
paid subscription
- The mobile operator charges additional
fees for special services
- Win a competition
- Reminders, for example, due to
non-payment
Why This Is so Dangerous
Most
people know by now that you should be critical of email and be suspicious of it
when asked to do certain things. On the other hand, they are not so
skeptical about smartphones. Because most consider your smartphone to be
more secure than your computer. A fallacy, especially when using Android
smartphones. But iPhone users shouldn't feel too safe either, smishing
attacks work across platforms. Another risk factor that should not be
underestimated: Smartphones are used on the go when users are distracted or in
a hurry. This lowers the attention threshold and one taps a link in a
message rather “quickly”.
Smishing: How To Protect Yourself
The good news is that you can easily protect yourself from smishing. The
attacks only result in damage if you swallow the bait. Therefore, pay
attention to the following alarm signals.
- Recognize
patterns:
Whenever you are urgently asked to do something as quickly as possible, your internal alarm system should be activated. Urgent security warnings,
expiring offers, and especially great deals should always be viewed as
warning signs of attempting hacking.
- Be
suspicious: Assume
that banks, payment services, and other companies never ask for passwords,
login details or other personal information in text messages.
- Don't
Click the Link: If you think there might be some truth to a
message, don't click the link anyway. Instead, log into the service manually in the browser and use this to check if something is wrong.
- Don't
reply: Never reply to smishing: In this case,
the cyber gangsters know that the email address is actually being used. As a result, there are even more spam and phishing emails.
- Get link
- X
- Other Apps
Comments
Post a Comment