www.darkreading.com Open in urlscan Pro
2606:4700::6811:7763  Public Scan

URL: https://www.darkreading.com/threat-intelligence/holiday-scams-drive-sms-phishing-attacks
Submission: On December 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 

Event
Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event |
December 8, 2021 <REGISTER NOW>
Alert
Check out our NEW section called "DR Tech" for comprehensive coverage of new &
emerging cybersecurity technology.
PreviousNext

Threat Intelligence

News


HOLIDAY SCAMS DRIVE SMS PHISHING ATTACKS

Attackers typically target consumers with malicious text messages containing
obfuscated links, but experts say businesses are threatened as well.
Robert Lemos
Contributing Writer
November 23, 2021
Some phishing scams lead to realistic, yet fake, notices.
Source: Proofpoint
PDF


As the holidays approach, the volume of short message service (SMS) phishing has
almost doubled from the same period in the prior year, continuing a trend of
SMS-text phishing growing as a vector to attack mobile users and their devices,
messaging-security firm Proofpoint stated in a blog post on Nov. 23. 



In the first half of 2021, global reports climbed by 270% compared to the same
period in 2020. While the recent surge is almost entirely aimed at consumers,
those attacks can easily cross over to business systems, especially as many
employees are working remotely and from their own devices, according to
Proofpoint. 

SMS phishing is also only the initial attack vector. Many attackers install
malware on target devices after a successful compromise, says Jacinta Tobin,
global vice president of Cloudmark operations at Proofpoint.



"Smishing attacks are becoming more sophisticated and there are other attacks
using malware which can control significant device functionality," she says.
"These sophisticated smishing and malware attacks pose serious risks to mobile
users and opens the door to enterprise-type attacks."



The end of the year has become an annual focus of attackers aiming to profit in
some way from the massive economic activity that accompanies the holiday season.
In the past, the most common tactics included unsolicited email messages or
advertising fraud.

Use of text messages as a phishing vector has become more popular because it is
effective. Text messages have a 98% open rate, and 90% of messages are opened in
the first three minutes, according to Proofpoint. Further, the success rate — as
measured by the proportion of users that click through to an attacker's page —
is eight times that of email phishing.

Attackers are also using databases of stolen or purchased subscriber information
to personalize text messages, adding first names and other details to make the
text more convincing, Tobin says.

"Historically, spelling mistakes and suspect websites were tell-tale signs of a
scam," she says. "Attackers are now increasingly more sophisticated and use
social engineering techniques to trick."



On the consumer side, SMS scams are financially motivated and aim to collect
either credentials or credit card account information. Most involve a fake
package delivery notification, ask for a credit card to claim the delivery, or
send victims to a website where they can collect their credentials. Attackers
also occasionally offer discounted or free products, if the victim fills out a
survey, and request credit card information at the end of the process.

"Holiday scams and smishing are really about getting money," Tobin says. "There
is a considerable market for credential information on the Dark Web and
fundamentally the attackers are driven by financial motives."

Consumers should look out for suspicious messages that may describe packages
they did not order or transactions they never conducted, she says. Mobile users
should always avoid downloading and installing software that they did not
specifically request.

Businesses should worry as well. More than 60% of companies around the world,
and 81% of US companies, have been attacked through smishing, Proofpoint says. A
third of companies have seen more than 10 smishing attacks in 2020, according to
the company's "2021 State of the Phish" report.

Further, consumer devices are often used for business reasons and may have
access to the corporate network, making attacks against mobile users
problematic. Any mobile device that is compromised could leak sensitive business
intelligence or allow access to the business' internal network.

While many significant steps to combat smishing remain outside most businesses'
purview, both security training and deployment of multifactor authentication can
reduce the threat that phishing attacks pose. Security training makes employees
more suspicious of messages coming through SMS channels, and multifactor
authentication prevents attackers from gaining access with a simple username and
password.

Industries can step up to help as well. Mobile network operators should
collaborate with government and industry groups to find ways to block massive
phishing campaigns, Tobin says. Mobile phone and device makers can improve user
interfaces to provide better signals of messages' legitimacy and ease the
reporting of text-message abuse, she says.

While holiday-themed smishing has surged, the increase in SMS attacks over the
past year is likely driven by the increase in COVID-themed SMS scams. Text
messages leading to fake pages purporting to be the Internal Revenue Service,
Federal Emergency Management Agency (FEMA), or other government agencies has
become common.

"Scammers can use links in text messages to install malicious code on your phone
or launch a phony webpage to collect personal, health insurance, or financial
information for use in other scams," the US Federal Communications Commission
stated in an August advisory. "COVID-19 text message scams offer cures, warnings
about the need for a test, or 'special offers.'"

Vulnerabilities/ThreatsAttacks/Breaches
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe



Recommended Reading:
7 Ways to Reduce Cyber Threats From Remote Workers Reuven Aronashvili 5 April
2021 darkreading.com 7 Ways to Reduce Cyber Threats From Remote Workers The
pandemic's decline won't stop the work-from-home trend nor the im… Software,
Incident Response Among Big Focus Areas in Biden's Cybersecu… Jai Vijayan 13 May
2021 darkreading.com Software, Incident Response Among Big Focus Areas in
Biden's Cybersecurity Executive Order Overall objectives are good, … Attackers
Compromised Code-Checking Vendor's Tool for Two Months Robert Lemos 20 April
2021 darkreading.com Attackers Compromised Code-Checking Vendor's Tool for Two
Months A script used to upload sensitive reports-with access t… How to Build a
Resilient IoT Framework Samuel Greengard 1 April 2021 darkreading.com How to
Build a Resilient IoT Framework For all of their benefits, IoT devices weren't
built with security in mind -- and… How the Biden Administration Can Make
Digital Identity a Reality Hal Granoff 16 April 2021 darkreading.com How the
Biden Administration Can Make Digital Identity a Reality A digital identity
framework is the answer to the US go… Watch Out for These Cyber-Risks Ken Todd
30 March 2021 darkreading.com Watch Out for These Cyber-Risks It's difficult to
predict what will materialize in the months ahead in terms of cyber-ri…
More Insights
White Papers
 * 
   Protecting Your Mainframe Against Relentless Ransomware
 * 
   2021 Ransomware Threat Report

More White Papers
Webinars
 * 
   Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * 
   Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2021
 * 
   Enterprise Cybersecurity Plans in a Post-Pandemic World

More Reports

Editors' Choice
In Appreciation: Dark Reading's Tim Wilson
Dark Reading Staff, Dark Reading
Finding Your Niche in Cybersecurity
Kristina Balaam, Senior Security Intelligence Engineer, Lookout
HP Issues Firmware Updates for Printer Product Vulnerabilities
Jai Vijayan, Contributing Writer
10 Stocking Stuffers for Security Geeks
Ericka Chickowski, Contributing Writer
Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
 * Cybersecurity Outlook 2022 Virtual Event
 * Creating an Encryption Strategy for Your Enterprise
 * Security Alert Fatigue: Tips for Taking Control

More Webinars
White Papers
 * Protecting Your Mainframe Against Relentless Ransomware
 * 2021 Ransomware Threat Report
 * Forrester's Planning for Failure: How to Survive a Breach
 * Cloud Cyber Resilience Report
 * Increased Cooperation Between Access Brokers, Ransomware Operators Reviewed

More White Papers
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
More Insights
White Papers
 * 
   Protecting Your Mainframe Against Relentless Ransomware
 * 
   2021 Ransomware Threat Report

More White Papers
Webinars
 * 
   Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * 
   Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2021
 * 
   Enterprise Cybersecurity Plans in a Post-Pandemic World

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2021 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept