Phishing moves to SMS

First limited attacks noted but experts differ on scale of problem

Phishing attacks on mobile phone users are a growing threat which operators must take immediate steps to prevent, says consulting firm LogicaCMG.

SMS phishing, sometimes shortened to smishing, uses text messages to trick users into handing over valuable private information or go to fake websites where spyware and other malicious programmes can be downloaded, says LogicaCMG Telecom's Chris Newton-Smith.

He says mobile operators have a big role to play in protecting consumer and business users from falling victim to smishing scams.

"It's a very real problem that's already made headlines in different parts of the world," he says.

"People are using these malicious spams for social engineering - encouraging people to ring a false customer care hotline which costs an astronomical amount per minute."

Some mobile operators are already moving to block these messages and prevent users getting them, he says, but believes others have been slow to react to the issue.

"Some are attaching warnings to messages that come from outside the network, so it's not necessarily just a matter of blocking," he says.

"It's up to all operators to address this problem, as it's not only aggravating for their customers it's also costing them money in refunding people who've complained. They must do more - this problem can be solved."

But mobile and wireless analyst Mike Hijdra of 2Fast4Wireless believes the problem is actually fairly small. "I believe this hardly ever happens," he told IT Pro.

"Operators have inside information on who's sending what, as all SMS traffic goes through them and is therefore monitored. If they want, they can simply ask phone manufacturers to fix it."

A bigger threat, he believes, comes from malicious attacks via Bluetooth wireless technology. "SMS is monitored, but Bluetooth is point to point so much more open to attack," he warned.

Featured Resources

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

The IT expert’s guide to AI and content management

How artificial intelligence and machine learning could be critical to your business

Free download

The path to CX excellence

Four stages to thrive in the experience economy

Free download

Becoming an experience-based business

Your blueprint for a strong digital foundation

Free download

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
BT conducts 'world's first' trial of quantum-secure communications
Network & Internet

BT conducts 'world's first' trial of quantum-secure communications

13 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021