Digital integration is a key component of modern society, with investors increasingly using mobile devices to access financial accounts and online applications allowing for investments to be made quickly from anywhere with phone service or Wi-Fi. However, with this convenience comes risk -- scammers understand this reliance and continue to exploit it to steal data and wealth from investors.
One way that scammers try to steal data and wealth from investors is through smishing, a tactic in which scammers send unsolicited messages to targets over short message service (SMS), or text messages. Though the term smishing comes from a combination of the words phishing and SMS, these scams can also be conducted through other messaging platforms such as iMessage, Google Messages and WhatsApp.
Smishing isn't a new scheme. However, a newer development with this type of fraud involves scammers requesting that targets respond to messages to get around protections put in place by providers that would otherwise automatically deactivate hyperlinks in messages received from unknown numbers.
In smishing attacks, scammers send text messages designed to manipulate targets into taking an unsafe action, such as clicking a link or replying with sensitive information. These messages often urge the target to act quickly to avoid an adverse action or secure a desirable outcome. The nature of text messages, which don't currently allow for individuals to hover over links to see their destination as can be done on an emailed link, can make spotting malicious links more difficult than other types of phishing attacks.
Smishing continues to grow as one of the most prominent forms of cybersecurity attacks, in large part because individuals might be more likely to click text message links than links received via email. Smishing attacks also allow scammers opportunities to conceal their identities through spoofing phone numbers using easily disposable cellphones, commonly referred to as burner phones, or through software.
As major technology companies have implemented technology solutions to help protect end-users, bad actors have evolved their tactics to get around these new safeguards. For example, some recently implemented protections automatically make links from unknown sources "unclickable" unless an individual takes certain actions, such as responding to the message. In response, bad actors might now request that targets take specific steps to activate the fraudulent link (see Figure 1).
Image source: FINRA.
If clicked or visited, the smishing link can lead to poor outcomes for the target, including data theft or the download of malicious software onto the device.
Consider these steps to protect yourself against smishing attacks:
Here are actions you can take if you suspect your device was compromised by a successful smishing attempt:
In addition, if you think you've been a target or victim of investment fraud, file a regulatory tip with FINRA.
Learn more about protecting your money.
Disclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.