ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

SMiShing?
SMiShing is the mobile version of phishing. Instead of catching the target with an email message, SMiShing attempts are sent via SMS, or text. Other than the method of introduction, there is little difference between SMiShing and the traditional phishing. For instance, both require the target to take the phisher (or, in the case of SMiShing, ‘smisher’) at their word and comply with any instructions.

Despite the general public learning to be more wary of cyber threats that come through the computer, there is still a lack of anticipation that these threats can also come in via cell phone. SMiShing is meant to use the disguise of a familiar contact to steal credentials and data, or delete it entirely.

A “smisher” will use any stolen credentials to access the user’s accounts and cause all sorts of chaos for them. For example, if you have any sensitive client information located on-site or stored in an online account, hackers can gain access to it with your credentials. Another way that a smisher might take advantage of you is by sending you a fake link via an SMS and request that you authenticate yourself or face a recurring fee. If this is the case, you should report the attempt to IT and give the smisher no response.

Spotting a SMiShing Scam
The first thing you should do if you receive a message that you suspect is part of a SMiShing attempt is to reach out to the supposed sender to confirm that it was legitimate. This should be done via some means other than text. Calling the contact or one of their representatives can help you to judge if the message is authentic or not without leaving yourself vulnerable to further threats.

It more or less boils down to leaving SMS messages from unknown senders alone. This is especially true of ‘5000’ numbers, which indicate that the message was originally an email sent as a text. Scammers have been known to use this tactic in their schemes.

Furthermore, messages with downloadable applications are another warning sign, as this is a common method of infecting a mobile device with malware. A good rule of thumb is to only download and utilize apps that come from your mobile device’s official marketplace, as those that don’t are very likely to turn out to be malware in disguise.

How To Protect Yourself
As mentioned above, if there is any doubt about the validity of a message, confirm its authenticity through an alternative line of communication. For added security, it helps to augment the practices we’ve outlined here with the use of a virtual private network, or VPN, safeguarding your mobile activity.

For help in securing your business devices and communications, call ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Remote Work Data Management Saving Money Operating System Government Workplace Strategy Gadgets Artificial Intelligence Managed IT services Networking Windows Spam Business Technology Mobile Device Management Blockchain WiFi Bandwidth Server Information Remote Encryption App Virtualization Office 365 Apple Information Technology Employee/Employer Relationship History Gmail Office Budget Two-factor Authentication Conferencing Cybercrime Access Control Data Security Health Big Data Wi-Fi BDR Analytics IT Management Training Hacker Cost Management Compliance Document Management Patch Management Vendor Employer-Employee Relationship Save Money Help Desk Remote Monitoring Hacking Voice over Internet Protocol Remote Computing Password Managed Services Computing Data loss Vendor Management Money Hard Drive Customer Service Unified Threat Management Firewall Legal Augmented Reality Word Search... Data storage Best Practice IBM Applications Website Retail Vulnerabilities Alert Project Management Hiring/Firing Mobile Office Outlook BYOD Free Resource Google Maps Chrome How To Scam Windows 11 Sports Social VPN Twitter SaaS DDoS Mobile Computing Update Law Enforcement Marketing End of Support Printer iPhone Education Running Cable Cortana Data Breach Content Filtering Storage Paperless Office Antivirus Router Maintenance Travel Virtual Reality Social Engineering Monitoring Cryptocurrency The Internet of Things Healthcare Black Market YouTube Cleaning User Remote Workers Websites Robot Laptop Windows 7 Mobility Meetings Software as a Service Virtual Private Network Data Protection Telephone Downtime Solid State Drive Safety Current Events Excel Solutions Chromebook Drones Virtual Desktop Experience PowerPoint Images 101 Administration Integration Automobile Display Presentation Tech Terms Specifications Virtual Assistant How To Managed IT Microchip IT Consultant Disaster Flexibility Digital Employees Avoiding Downtime Customer Relationship Management Holidays Co-Managed IT Taxes Identity Theft Processor Entertainment Hack Lithium-ion battery Notifications Unified Communications Cooperation Video Conferencing Google Docs Processors Virtual Machines Bluetooth Physical Security Computer Repair Distributed Denial of Service Office Tips Multi-factor Authentication Professional Services Private Cloud Memory Start Menu HIPAA Downloads Saving Time Computer Care Vulnerability Politics Wireless Technology Managed Services Provider Computers Bitcoin Machine Learning eWaste Settings Banking Term Google Apps Tablets Google Wallet Download Piracy intranet Shortcut Messenger Deep Learning Telework Wireless HTML Browsers Smartwatch Supercomputer Nanotechnology Communitications Heating/Cooling Microsoft 365 Google Calendar Environment Virus Smart Technology Business Metrics Google Play Hosted Solution Windows XP Upload Procurement Software License Social Networking Books Social Network FinTech Motion Sickness Data Analysis CES Society Screen Reader IT Assessment Inbound Marketing Comparison Google Drive Language Security Cameras Trends Supply Chain Management Mobile Technology Value Devices Cyber security Knowledge Reading Corporate Profile Monitors Customer Resource management Organization Visible Light Communication Fileless Malware Employer Employee Relationship Windows 8 Smart Devices Tip of the week Television Telephony Supply Chain Cabling Gamification Remote Working Electronic Payment Company Culture Staffing Regulations Trend Micro Relocation Tablet Displays Telephone System AI G Suite Advertising Work/Life Balance Directions Digital Security Cameras Tracking Tech Support Backup and Disaster Recovery Electronic Health Records IP Address Transportation Mouse VoIP Workplace Content Desktop Wasting Time Phone System Accountants eCommerce Modem Electronic Medical Records Web Server Videos Digital Payment Database Surveillance SharePoint In Internet of Things Scams Hacks Worker Network Congestion Managing Costs Recovery Equifax Competition SSID Reliable Computing Access Writing Health IT Media Public Cloud Tactics Development Hard Drive Disposal Employer/Employee Relationships Computer Accessories Time Management Entrepreneur Cables LiFi Username Virtual Machine Documents Startup Optimization Application Freedom of Information Audit Scalability Spyware Reviews Text Messaging Navigation 2FA File Sharing Proactive IT Addiction email scam Teamwork Administrator Business Intelligence Redundancy Point of Sale Bring Your Own Device Data Storage Mobile Security Hypervisor Securty Legislation News Medical IT Cache User Tip Shopping Evernote Paperless Workers Music Network Management Domains SQL Server Unified Threat Management Shortcuts PCI DSS Licensing Emails Humor Troubleshooting Fake News Printing Proxy Server Gig Economy CCTV Business Communications Service Level Agreement Internet Service Provider Computing Infrastructure Azure Botnet Touchscreen Be Proactive Emergency Rental Service Micrsooft Management Regulations Compliance Computer Malfunction Device security Managed IT Service Wireless Headphones Memes Public Speaking Microsoft Excel Vendor Mangement Flash Workplace Strategies Telephone Systems Tech Human Resources Samsung Business Growth Streaming Media Going Green Net Neutrality Business Cards Keyboard Uninterrupted Power Supply Error Financial Data Webcam IT Business Owner Hard Drives Business Mangement Bookmark Risk Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?