Digital integration is a key component of modern society, with investors increasingly using mobile devices to access financial accounts and online applications allowing for investments to be made quickly from anywhere with phone service or Wi-Fi. However, with this convenience comes risk -- scammers understand this reliance and continue to exploit it to steal data and wealth from investors.
One way that scammers try to steal data and wealth from investors is through smishing, a tactic in which scammers send unsolicited messages to targets over short message service (SMS), or text messages. Though the term smishing comes from a combination of the words phishing and SMS, these scams can also be conducted through other messaging platforms such as iMessage, Google Messages and WhatsApp.
Smishing isn't a new scheme. However, a newer development with this type of fraud involves scammers requesting that targets respond to messages to get around protections put in place by providers that would otherwise automatically deactivate hyperlinks in messages received from unknown numbers.
In smishing attacks, scammers send text messages designed to manipulate targets into taking an unsafe action, such as clicking a link or replying with sensitive information. These messages often urge the target to act quickly to avoid an adverse action or secure a desirable outcome. The nature of text messages, which don't currently allow for individuals to hover over links to see their destination as can be done on an emailed link, can make spotting malicious links more difficult than other types of phishing attacks.
Smishing continues to grow as one of the most prominent forms of cybersecurity attacks, in large part because individuals might be more likely to click text message links than links received via email. Smishing attacks also allow scammers opportunities to conceal their identities through spoofing phone numbers using easily disposable cellphones, commonly referred to as burner phones, or through software.
As major technology companies have implemented technology solutions to help protect end-users, bad actors have evolved their tactics to get around these new safeguards. For example, some recently implemented protections automatically make links from unknown sources "unclickable" unless an individual takes certain actions, such as responding to the message. In response, bad actors might now request that targets take specific steps to activate the fraudulent link (see Figure 1).
Image source: FINRA.
If clicked or visited, the smishing link can lead to poor outcomes for the target, including data theft or the download of malicious software onto the device.
Consider these steps to protect yourself against smishing attacks:
Here are actions you can take if you suspect your device was compromised by a successful smishing attempt:
In addition, if you think you've been a target or victim of investment fraud, file a regulatory tip with FINRA.
Learn more about protecting your money.
免责声明:投资有风险,本文并非投资建议,以上内容不应被视为任何金融产品的购买或出售要约、建议或邀请,作者或其他用户的任何相关讨论、评论或帖子也不应被视为此类内容。本文仅供一般参考,不考虑您的个人投资目标、财务状况或需求。TTM对信息的准确性和完整性不承担任何责任或保证,投资者应自行研究并在投资前寻求专业建议。