What Is Smishing and How Can You Protect Yourself | Total Security

You are probably familiar with “phishing”. Fraudsters try to lure unsuspecting Internet users to manipulated Internet sites using bogus e-mails. Anyone who types in access data or passwords here has fallen into the trap. Smishing is the mobile version of this scam, meaning fraudulent text messages intended to trick victims. Learn how it works and how to protect yourself in this article.


Smishing


Have you ever received a text message from a well-known transportation company that you didn't question for a second? Why should you? After all, we order so much online these days and with so many delivery notifications you don't always look too closely. But you should. Because behind this could be a so-called smishing message. This is a modified form of phishing.

Smishing, the Mobile Brother of Phishing

Figuratively speaking, phishing messages are used to “fish”, ie to steal passwords or other access data. To do this, the phishing scammers send fake e-mails that are made up as if they came from a customer advisor at a bank. For a flimsy reason, they guide the recipient to a fake website, where they are asked to type in an account number, password (PIN), and transaction number (TAN), for example, for verification purposes. If that happens, the fraudsters will empty the account.

SMS Fraud

Smishing relies on the same principle, but the fraudsters do not use e-mails for manipulation, but rather short messages such as SMS. Hence the name is made up of SMS and phishing. Such short messages contain, for example, links that lead to the download of malware, which in turn, for example, give attackers access to smartphones, read out login data or lock the device and then demand money for unlocking. Requests to report to a specific telephone number are also common. In this case, there are either expensive tapes or trained perpetrators who try to extract personal information from the victims. Or there is a traditional link to a fake website into which the victim is supposed to enter personal data.

Typical Smishing Stitches

Back to parcel tracking, for example, Victims receive a text message that supposedly comes from DHL and contains a link for parcel tracking. However, behind the link there is, for example, a page for accessing credit card data. More smishing stitches:

  • A bank reports unusual account movements
  • Confirmation for the conclusion of a paid subscription
  • The mobile operator charges additional fees for special services
  • Win a competition
  • Reminders, for example, due to non-payment

Why This Is so Dangerous

Most people know by now that you should be critical of email and be suspicious of it when asked to do certain things. On the other hand, they are not so skeptical about smartphones. Because most consider your smartphone to be more secure than your computer. A fallacy, especially when using Android smartphones. But iPhone users shouldn't feel too safe either, smishing attacks work across platforms. Another risk factor that should not be underestimated: Smartphones are used on the go when users are distracted or in a hurry. This lowers the attention threshold and one taps a link in a message rather “quickly”.

Smishing: How To Protect Yourself

The good news is that you can easily protect yourself from smishing. The attacks only result in damage if you swallow the bait. Therefore, pay attention to the following alarm signals.

  • Recognize patterns: Whenever you are urgently asked to do something as quickly as possible, your internal alarm system should be activated. Urgent security warnings, expiring offers, and especially great deals should always be viewed as warning signs of attempting hacking.
  • Be suspicious: Assume that banks, payment services, and other companies never ask for passwords, login details or other personal information in text messages.
  • Don't Click the Link: If you think there might be some truth to a message, don't click the link anyway. Instead, log into the service manually in the browser and use this to check if something is wrong.
  • Don't reply: Never reply to smishing: In this case, the cyber gangsters know that the email address is actually being used. As a result, there are even more spam and phishing emails.
Install Total Security to protect your computer from smashing attacks.

Comments