Smishing: The New Frontier of Social Engineering Scams

Smishing image

In an increasingly digital world, our smartphones have become extensions of ourselves, holding our personal information and our connections to the world. Unfortunately, this reliance on mobile technology has opened up new avenues for scammers to exploit. One such method, gaining traction at an alarming rate, is smishing. A portmanteau of “SMS” and “phishing,” smishing involves fraudulent text messages designed to trick individuals into revealing sensitive personal information.

While many know phishing emails, smishing can be even more insidious. The concise nature of text messages often lulls people into a false sense of security, leading them to let their guard down. Furthermore, smishing attacks often employ social engineering tactics, playing on our emotions and vulnerabilities to circumvent our logical defenses.

The Anatomy of a Smishing Attack

The sources highlight a particularly cunning smishing tactic: the “long-lost friend” or “acquaintance” approach. Instead of relying on alarmist messages about compromised accounts or missed deliveries, these smishers take a more subtle route, aiming to build a rapport with the victim.

The process usually begins with a text message from an unknown number. The sender often uses a generic name, such as “Mia”, “Diana”, or “Alyssa,” to appear more approachable. The initial message is usually friendly, inquisitive, and deliberately vague. They might claim to have stumbled upon your number in their address book, suggesting a past encounter, perhaps at a social gathering or business event.

The scammer’s goal is to elicit a response, however brief. Once a conversation begins, they will continue to play the role of a long-lost connection, offering vague details and asking leading questions to extract personal information. They might ask about your work or whereabouts or suggest meeting in person.

Interestingly, the sources note a recurring pattern in the images used by these smishers. When asked to prove their identity, they often send pictures that depict young, well-dressed Asian women in nondescript locations. This suggests a calculated tactic, potentially leveraging cultural stereotypes and playing on ingrained biases to appear more trustworthy and relatable.

Why Smishing is so Effective

What makes these “connection smishes” particularly dangerous is their exploitation of our basic human need for connection. They prey on feelings of loneliness, our inherent politeness, and even our faulty memories. We’ve all had moments where we’ve struggled to place a face or recall a name. These smishers exploit those moments of uncertainty, hoping you’ll fill in the blanks and inadvertently reveal personal information in the process.

The sources describe how, in some cases, the smishers will even switch to speaking Chinese, further reinforcing their assumed identity and potentially making the victim more susceptible to manipulation.

Protecting Yourself from Smishing Attacks

The unfortunate reality is that smishing attacks are becoming increasingly commonplace. A 2022 FTC study revealed that text-based spam attacks resulted in a staggering $330 million in losses, a figure that has likely ballooned since then.

While cellular service providers work to combat spam texts, their efforts are often inadequate against these sophisticated social engineering tactics. Therefore, it is crucial to arm yourself with the knowledge and awareness needed to identify and avoid these scams.

Here are some practical steps you can take to protect yourself:

  • Be wary of unsolicited texts from unknown numbers, even if they seem friendly or familiar.
  • Do not engage in conversation with suspicious texters. If you don’t recognize the number, it’s best to ignore the message.
  • Never click on links or open attachments from unknown senders.
  • Be cautious about the information you share online and on social media. Scammers can use this information to create convincing profiles.
  • If you believe a smishing scam has targeted you, block the number and report it to your cellular service provider and the FTC.
  • Please share this information with your friends and family, especially older adults, who may be more vulnerable to these types of scams.

Alternate Resources

For more information on smishing and other types of scams, you can visit the following websites:

We can work together to combat these malicious attacks and protect ourselves and our loved ones by staying informed and vigilant.