Category: 

What Is SMiShing?

A person receiving a SMSishing attack.
Article Details
  • Written By: Mary Elizabeth
  • Edited By: Bronwyn Harris
  • Last Modified Date: 14 July 2014
  • Copyright Protected:
    2003-2014
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
In the US, workers under 25 have unemployment rates that are twice the national average.  more...

July 28 ,  1945 :  14 people were killed when a US Army bomber crashed into the Empire State building.  more...

Phishing is like fishing in that it uses bait or a lure to make a catch. Phishing, however, refers to baiting a person — often, but not always, through an email — to reveal important personal information that could help the phishing scammer gain access to accounts or money or steal the target’s identity. SMiShing, or smishing, is short for SMS phishing, that is, phishing using SMS messages. The term was coined on 25 August 2006 by David Rayhawk and first used on the McAfee® Avert® Labs blog.

Whereas the goal of phishing is often to have the target divulge valuable personal information — such as credit card numbers, bank account numbers, or usernames and passwords — after clicking some kind of link, SMiShing may either request a response or take a different approach that involves a download. In this case, the target is tricked into downloading a virus or malware, such as a Trojan horse, onto his or her mobile phone.

Ad

SMiShing threats have worked in a variety of ways. An early one came as a confirmation SMS message for a dating service, telling the target that he or she would be charged unless a link was clicked to cancel. The URL contained a prompt to download a program containing a Trojan horse, which would turn the cell phone into a zombie, allowing the scammer to take control of it and possibly use it for distributed denial-of-service (DDoS) attacks. Alternatively, the SMiShing scame might allow the download of spyware that would allow the scammer to eavesdrop on conversations held on the phone.

Anti-virus software and anti-malware software are useful in helping prevent SMiShing attacks. Avoiding clicking on suspicious text messages is another useful strategy. When in doubt, emails that threaten account closure or denied access, or charges unless action is taken should be confirmed via a phone call rather than by responding to the message itself. It is particularly important not to use any number given in the message itself, but to independently find the number, for example, on a bank card or credit card, in the phone book, or some other tamper-proof way.

Some financial institutions make a point of alerting customers to the styles of attacks that have been reported, so customers can check to see if this service is available. Also, customers can report suspicious messages to the apparent source — but in a fresh email, not by clicking ‘Reply’ — and to their Internet Service Provider (ISP), to help prevent the spread of SMiShing.

Ad

Discuss this Article

anon333132
Post 2

How do we know the phone in the picture is receiving a smishing attack, not just a harmless text?

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email