{"id":28807,"date":"2024-07-28T08:40:13","date_gmt":"2024-07-28T12:40:13","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=28807"},"modified":"2024-07-28T08:40:13","modified_gmt":"2024-07-28T12:40:13","slug":"smishing-the-sneaky-text-message-scam","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/smishing-the-sneaky-text-message-scam\/","title":{"rendered":"Smishing: The Sneaky Text Message Scam"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Smishing: The Sneaky Text Message Scam<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\" alignleft\" src=\"https:\/\/thundercloud.net\/infove\/images\/2024\/smish.png\" alt=\"What is Smishing and how to avoid becoming a victim. Cloudeight InfoAve \" width=\"184\" height=\"180\" \/>This month we&#8217;ve been focusing on keeping you safe. The cyberworld has become a money-making playground for criminals and scammers. We don&#8217;t want you to be a victim.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"> In 2023, victims lost $12.5 billion via smishing scams, according to the FBI\u2019s Internet Crime Complaint Center. The best way we can help you stay safe is to help you stay informed. Today, we&#8217;re going to focus on Smishing.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">What is Smishing?<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Smishing is a type of phishing attack that uses text messages (SMS) to deceive people into revealing personal information. Cybercriminals often pose as legitimate businesses, banks, or government agencies to lure victims into clicking on malicious links or providing sensitive data.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">How Does Smishing Work?<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Smishing attacks typically follow these steps:<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Targeting:<\/strong> <\/span><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Cybercriminals identify potential victims through various methods, such as purchasing contact lists or using data breaches.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Creating &amp; delivering compelling text messages that require action:<\/strong> <\/span><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Criminals craft convincing text messages that mimic real organizations, often creating a sense of urgency or fear, and send the malicious text message is sent to the target&#8217;s phone. Then they use phishing to get users to click on a link link or reply to the message who are then directed to a fraudulent website designed to steal their personal information.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Common Smishing Tactics<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Impersonating Banks and Financial Institutions<\/strong>: Scammers often claim to be from your bank, notifying you of suspicious activity or requesting account verification.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Delivery Notifications:<\/strong> Fake shipping notifications with tracking links that lead to malicious websites.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Government Imposters:<\/strong> Pretending to be from government agencies, such as the IRS, to demand immediate payment of taxes.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Lottery Winnings:<\/strong> Promising large cash prizes in exchange for personal information.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">How to Protect Yourself from Smishing:<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Be Wary of Unexpected Texts:<\/strong> If you receive a text message from an unknown number or unexpected sender, be cautious.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Verify Information:<\/strong> Never click on links or provide personal information without independently verifying the source.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Use 2FA:<\/strong>\u00a0 Add an extra layer of security to your accounts by using 2FA (Two-factor authentication).<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Report Smishing:<\/strong>\u00a0 Forward suspicious text messages to your carrier&#8217;s designated spam number or report the smishing attempt to the FTC at <span style=\"text-decoration: underline;\"><a href=\"https:\/\/ReportFraud.ftc.gov\" target=\"_blank\" rel=\"noopener\">ReportFraud.ftc.gov<\/a><\/span>. If you think that you are a victim of smishing, you should contact law enforcement to report the scam. You can also file a complaint with the FCC at no cost. <a href=\"https:\/\/consumercomplaints.fcc.gov\/hc\/en-us\/articles\/205082880\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Read the FCC Complaint Center FAQ<\/span><\/a> to learn more about the FCC&#8217;s informal complaint process, including how to file a complaint, and what happens after a complaint is filed.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\"><strong>Always Remember:<\/strong> Legitimate businesses will never ask for sensitive information through text messages. If you suspect a smishing attempt, delete the message immediately and avoid clicking on any links. The best way to stay safe is to stay informed and always be cautious. by following these tips, you can reduce your risk of becoming a victim of smashing and other cybercrimes. We&#8217;re committed to keeping you safe!<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Smishing: The Sneaky Text Message Scam This month we&#8217;ve been focusing on keeping you safe. The cyberworld has become a money-making playground for criminals and scammers. We don&#8217;t want you to be a victim. In 2023, victims lost $12.5 billion via smishing scams, according to the FBI\u2019s Internet Crime Complaint Center. The best way we can help\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/smishing-the-sneaky-text-message-scam\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3590,1670,1680,1656,3766,4507],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28807"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=28807"}],"version-history":[{"count":5,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28807\/revisions"}],"predecessor-version":[{"id":28812,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/28807\/revisions\/28812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=28807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=28807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=28807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}