Phishing moves to SMS

First limited attacks noted but experts differ on scale of problem

Phishing attacks on mobile phone users are a growing threat which operators must take immediate steps to prevent, says consulting firm LogicaCMG.

SMS phishing, sometimes shortened to smishing, uses text messages to trick users into handing over valuable private information or go to fake websites where spyware and other malicious programmes can be downloaded, says LogicaCMG Telecom's Chris Newton-Smith.

He says mobile operators have a big role to play in protecting consumer and business users from falling victim to smishing scams.

"It's a very real problem that's already made headlines in different parts of the world," he says.

"People are using these malicious spams for social engineering - encouraging people to ring a false customer care hotline which costs an astronomical amount per minute."

Some mobile operators are already moving to block these messages and prevent users getting them, he says, but believes others have been slow to react to the issue.

"Some are attaching warnings to messages that come from outside the network, so it's not necessarily just a matter of blocking," he says.

"It's up to all operators to address this problem, as it's not only aggravating for their customers it's also costing them money in refunding people who've complained. They must do more - this problem can be solved."

But mobile and wireless analyst Mike Hijdra of 2Fast4Wireless believes the problem is actually fairly small. "I believe this hardly ever happens," he told IT Pro.

"Operators have inside information on who's sending what, as all SMS traffic goes through them and is therefore monitored. If they want, they can simply ask phone manufacturers to fix it."

A bigger threat, he believes, comes from malicious attacks via Bluetooth wireless technology. "SMS is monitored, but Bluetooth is point to point so much more open to attack," he warned.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Leading the data race

The trends driving the future of data science

Download now

How to create 1:1 customer experiences at scale

Meet the technology capable of delivering the personalisation your customers crave

Download now

How to achieve daily SAP releases

Accelerate the pace of SAP change to support your digital strategy

Download now

Recommended

Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020
Third-party apps are tracking your WhatsApp activity
social media

Third-party apps are tracking your WhatsApp activity

21 Sep 2020
Ransomwiz lets you test your security with simulated ransomware
ransomware

Ransomwiz lets you test your security with simulated ransomware

21 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

21 Sep 2020