Phishing & Social Engineering
What Is Smishing?
Smishing, a portmanteau of "SMS" and "phishing," is a form of social engineering attack that uses text messages to trick recipients into divulging sensitive information, clicking malicious links, downloading harmful software, or transferring funds.
Smishing, a portmanteau of "SMS" and "phishing," is a form of social engineering attack that uses text messages to trick recipients into divulging sensitive information, clicking malicious links, downloading harmful software, or transferring funds. According to CISA, smishing uses text messages to trick users "into opening harmful links, downloading malicious software, or submitting sensitive information" (CISA, "Avoiding Social Engineering and Phishing Attacks"). Smishing exploits the relatively high user trust in text messages compared to email and bypasses corporate email security entirely, making it an increasingly common attack vector as organizations strengthen email defenses.
How does smishing work?
Smishing attacks follow a predictable attack lifecycle. In the target selection phase, attackers obtain phone numbers from data breaches, public datasets, or simply cast a wide net knowing that 3.5 billion smartphones worldwide can receive text messages from any number globally. Attackers may purchase phone number lists on dark web marketplaces or harvest numbers from breached databases. The cost of acquiring phone numbers is minimal compared to sending SMS messages at scale.
Message crafting exploits urgency, fear, and curiosity. In 2025, attackers increasingly use AI to craft highly convincing messages that mimic human tone and contextual relevance. Traditional smishing messages contained obvious errors ("Your bank detected unusual activity, click here"), but AI-generated messages now read like legitimate communications from trusted organizations. Approximately 55% of suspected smishing texts contain URLs designed to redirect victims to credential-harvesting sites or malware distribution points (Proofpoint, "State of the Phish," 2024).
Delivery occurs via SMS gateways, spoofing tools, or compromised devices. Messages appear to originate from trusted sources using sender ID spoofing—a caller ID equivalent for text messages where attackers register numbers that display as coming from "Bank of America" or "Amazon" despite originating from attacker-controlled infrastructure. The technical barrier to entry is low: commercial SMS spoofing services operate openly in some jurisdictions, and attackers in others use shortcodes or legitimate SMS providers with forged company details.
Victim interaction is the critical step. When a recipient clicks the URL in the smishing message, they land on an attacker-controlled website designed to steal credentials, banking information, or deploy malware. The landing page typically mimics legitimate login interfaces—a fake Apple ID login, a fake Amazon account verification form, or a banking application login. Users enter their credentials, which the attacker captures. Some smishing campaigns include QR codes ("quishing") that redirect to malicious sites when scanned, bypassing URL filtering by using image-based delivery.
Data harvesting and malware deployment follow successful interaction. Stolen credentials enable account takeover, identity theft, or credential stuffing attacks against other services. Malware installation (from downloaded APKs or iOS apps or drive-by downloads) grants attackers remote access, allows monitoring of user activity, or enables financial fraud through banking Trojan functionality.
Exploitation and evasion complete the attack. Stolen data is monetized through financial fraud, identity theft, or sold on dark web marketplaces. Attackers continually change tactics and phone numbers to avoid detection and carrier-level filtering.
Common smishing scenarios include bank fraud alerts impersonating the victim's actual bank ("Unusual activity detected—verify account"), package delivery notifications impersonating FedEx, UPS, or USPS ("Your package is awaiting delivery—click to reschedule"), account verification and password reset scams ("Confirm your account—update password here"), prize or lottery scams ("Congratulations! You've won—claim prize here"), tax season scams impersonating the IRS ("Refund ready—verify identity"), tech support scams ("Your device is compromised—call this number"), and service cancellation threats ("Your subscription expires today—renew here").
New techniques in 2025 include eSIM manipulation where attackers switch victims' SIM cards to redirect SMS, spoofed sender information making messages appear to come from legitimate contacts, QR codes embedded in SMS messages ("quishing via SMS"), and AI-generated personalized messages that reference recent transactions or account details (Cyvent, "Smishing in 2025: How to Identify and Protect Against SMS Phishing," 2025).
How does smishing differ from phishing and vishing?
Smishing, phishing, and vishing are all social engineering attacks using different delivery channels and exploitation mechanisms. The comparison table illustrates the tradeoffs:
Attribute | Phishing (Email) | Smishing (SMS) | Vishing (Voice) |
|---|---|---|---|
Delivery channel | Text message (SMS) | Phone call (VoIP) | |
Real-time interaction | One-way (user clicks or opens) | Limited—typically one-way but can include replies | Yes—live conversation with attacker |
Click-through rate | 2-4% (Proofpoint, 2024) | 8.9-14.5%, some sources cite 19-36% (SentinelOne, Keepnet Labs, 2025) | ~70% compromise rate in simulated calls |
Scalability | Extremely high—millions of emails at minimal cost | High—millions of SMS, though SMS is more expensive than email | Low to medium—live operators or AI voice limits scale |
Mobile device focus | Lower—often checked on desktops | High—SMS delivered to personal devices outside corporate perimeter | High—personal phone devices |
Security filtering | Email gateways widely deployed | Fewer mobile-level filters; bypasses corporate email security | No automated filtering |
User trust level | Lower—users trained on email phishing for years | Higher—users more trusting of text messages than email | Highest—live human voice creates authority |
Operating system defenses | Email client safeguards | iOS and Android have built-in protections but limited | No OS-level protections for voice |
Attacker effort | Low—template-based, mass distribution | Low to moderate—template-based for scale, personalized for targeting | Moderate to high—requires social engineering skill |
AI enhancement | Text generation | Text generation + QR code creation | Voice cloning + deepfake |
Ideal for | Mass credential harvesting with mature security controls | Bypassing email security to reach personal devices with high trust | Real-time social engineering with maximum psychological pressure |
Neither channel is universally better. Phishing reaches massive scale through email infrastructure but faces increasingly mature security controls. Smishing exploits higher user trust in text messages and reaches personal devices often outside corporate security perimeters. Vishing achieves highest per-target success through live social pressure but requires more attacker effort. Most organizations face all three simultaneously.
Why has smishing gained traction?
Smishing has surged because SMS represents an enforcement gap—organizations heavily invest in email security while leaving text messages largely unprotected. Users inherently trust SMS more than email, having been trained for years to be suspicious of phishing emails. This trust differential is the core vulnerability smishing exploits.
Smishing incidents rose 18% globally in 2024 (Keepnet Labs, "Smishing Statistics," 2025). The Federal Trade Commission reported that consumers lost $470 million in text message scams in 2024—five times the $90 million reported in 2020 (FTC via Keepnet Labs, 2025). This five-fold increase in reported losses in four years indicates rapidly escalating attack volume and impact.
Organizational targeting has intensified. 75% of organizations report being targeted by smishing campaigns (Proofpoint, "State of the Phish," 2024). Smishing attacks on financial institutions increased 22% from 2023 to 2024 (Keepnet Labs, "Smishing Statistics," 2025). Tax-related smishing and phishing scams caused an average loss of $8,199 per person in 2024, indicating that smishing is used to target high-value victims and specific demographics (Keepnet Labs, "Smishing Statistics," 2025).
The SMS channel penetration rate is near-universal. Proofpoint analyzed 1.4 trillion SMS messages over a 12-month period in their 2025 research, underscoring the massive volume of text message traffic and attack opportunities (Proofpoint, "The Human Factor," 2025). Unlike email, which users can filter and manage, most people receive and read text messages immediately—the default behavior is to trust and read SMS.
AI amplification has made smishing more effective. AI-generated smishing messages now closely mimic legitimate communications, eliminating grammatical errors and awkward phrasing that traditionally flagged phishing. Personalized AI-generated messages referencing recent transactions, account details, or delivery tracking create heightened credibility that template-based smishing cannot achieve.
Bring Your Own Device (BYOD) policies and remote work have expanded the attack surface. Personal devices used for work are often outside corporate security perimeters, meaning organizational security teams have no visibility into or control over text message-based threats. Smishing targeting employees' personal phones bypasses corporate security infrastructure entirely.
Mobile device security maturity lags email security. SMS filtering technology is far less mature than email security. While iOS and Android have built-in protections that warn users about messages from unknown senders, these protections are insufficient against sophisticated smishing. Most organizations lack SMS-specific security policies and monitoring.
What are the limitations of smishing?
Smishing's SMS character limit constrains the sophistication of social engineering narratives. Traditional email phishing can embed complex stories, multiple images, and rich formatting. SMS is limited to ~160 characters per message (or ~1,600 for multi-part messages), forcing attackers to distill their lure to essential elements. This constraint sometimes makes smishing messages less sophisticated, though AI generation has largely overcome this limitation through concise, punchy messaging.
Phone number traceability provides investigative advantages. Unlike email sender addresses, which can be spoofed globally, phone numbers have some traceable routing infrastructure. Law enforcement and security researchers can track phone numbers used in smishing campaigns, though attackers can evade this through VoIP services, prepaid numbers, and SIM swapping.
Carrier-level filtering is improving. Mobile carriers are increasingly deploying spam and scam detection filters. T-Mobile Scam Shield, AT&T ActiveArmor, and other carrier offerings detect patterns of smishing using heuristic analysis and threat intelligence databases. However, implementation and effectiveness vary significantly by carrier. The caveat is that carrier filtering has significant false positive rates and can block legitimate SMS, limiting organizational adoption.
Operating system protections warn users about messages from unknown senders. Both iOS and Android detect and filter suspicious messages using machine learning. Apple's iMessage platform blocks known phishing URLs. However, these protections are designed for consumer protection and may not meet enterprise security standards.
No rich media capability prevents sophisticated HTML-based attacks. Email phishing can embed convincing HTML that perfectly mimics legitimate communications. SMS cannot—it is plain text only (or multimedia SMS, which is less universally supported). This constraint, combined with character limits, makes some sophisticated smishing campaigns technically more limited than email equivalents.
How can organizations defend against smishing?
Smishing defense requires awareness, technology, and policy changes to extend security coverage beyond email to mobile platforms.
Security awareness training specific to smishing is critical. Most organizations conduct email phishing training but neglect SMS. Behavior change through realistic smishing simulations is measurable: organizations implementing simulated smishing exercises see improved employee recognition of text message attacks. Training should cover common smishing scenarios, the importance of not clicking SMS links, and verification procedures. Importantly, only 23% of organizations educate users on TOAD and smishing attacks, leaving a significant protection gap (Proofpoint, "State of the Phish," 2024).
Multi-factor authentication (MFA) on all accounts provides defense-in-depth. Even if credentials are stolen via smishing, attackers cannot access accounts without the second factor. This control is essential because smishing often targets credentials directly. Organizations should enforce MFA for email, social media, financial accounts, and cloud services. The caveat is that SMS-based MFA codes themselves can be targeted by smishing, so phishing-resistant MFA (FIDO2/WebAuthn hardware keys) is preferred where feasible.
Mobile threat defense (MTD) solutions detect and block malicious SMS in real-time. Solutions from vendors like Lookout, Zimperium, and Wandera protect mobile devices by analyzing incoming messages for known phishing URLs, malware signatures, and suspicious patterns. MTD solutions provide enterprise visibility into mobile device threats that organization-provided devices would otherwise lack.
SMS filtering and monitoring using both carrier-level and device-level tools blocks suspicious messages based on content analysis and sender reputation. Algorithms identify and block messages containing common smishing keywords ("Verify," "Confirm," "Click here," "Urgent"), shortened URLs, or sender IDs that spoof trusted organizations. Device-level filtering through iOS and Android provides baseline protection; carrier filtering provides network-level enforcement.
Zero-trust approach to SMS means never clicking links in unsolicited text messages and always verifying sender identity through independent contact methods. This simple policy—"Never click links in texts, always call back using a known number"—defeats most smishing attacks. Organizations should communicate this clearly to all employees and make it part of security culture.
Incident response procedures should include: reporting suspected smishing to the mobile carrier by forwarding to 7726 (SPAM), reporting to the FTC at reportfraud.ftc.gov, scanning the device for malware using mobile antivirus, and changing passwords for any accounts if credentials were compromised. Organizations should collect and share smishing message details (sender ID, timestamp, message content) with security teams to identify patterns and campaigns.
Keep software updated ensures mobile OS and applications have latest security patches. Many smishing campaigns exploit unpatched mobile OS vulnerabilities. Regular OS updates and app updates patch exploitation vectors.
Limit personal information sharing reduces the attacker's targeting data. The less information available about an individual, the harder personalized smishing becomes. However, this is imperfect—attackers can gather information from breaches, so the control is not primary.
Organizational policies should include: (1) establish clear SMS verification procedures for sensitive requests; (2) educate employees to never provide credentials, MFA codes, or approval via text; (3) monitor for compromised employee phone numbers being used to send smishing; and (4) integrate SMS threats into incident response planning and SIEM monitoring where feasible.
FAQs
How is smishing different from regular phishing?
Smishing uses SMS/text messages as the delivery channel while traditional phishing uses email. Smishing exploits higher user trust in text messages—SMS click-through rates are 8.9-14.5% compared to 2% for email phishing. Smishing also completely bypasses corporate email security filters, reaching personal devices outside organizational perimeter. For victims, the psychological impact differs too: text messages create immediate urgency and carry an implicit trust that email has lost through years of phishing awareness training (SentinelOne, "Phishing Vs Smishing Vs Vishing," 2024; Proofpoint, "State of the Phish," 2024).
How common are smishing attacks?
75% of organizations report being targeted by smishing campaigns (Proofpoint, "State of the Phish," 2024). The FTC reported $470 million lost to text message scams in 2024, five times the 2020 figure. Smishing incidents grew 18% globally in 2024, and smishing attacks on financial institutions increased 22% from 2023 to 2024 (Keepnet Labs, "Smishing Statistics," 2025). These figures represent conservative estimates, as many smishing attacks go unreported.
What should I do if I receive a suspicious text message?
Do not click any links or reply to the message. Verify the sender through an independent channel—for example, if the message claims to be from your bank, call the number on the back of your bank card rather than using any phone number from the text. Forward the message to 7726 (SPAM) to report it to your carrier. Delete the message. If you clicked a link before realizing it was suspicious, scan your device for malware using mobile antivirus software and change passwords for any accounts that might be compromised (CISA, "Avoiding Social Engineering and Phishing Attacks").
Can smishing install malware on my phone?
Yes. Clicking malicious links in smishing messages can redirect to sites that download malware onto your device. This malware can steal personal data, monitor activity, access contacts, or grant remote control to attackers. Android devices are particularly vulnerable to malware-distribution campaigns. Keeping your OS updated with latest patches and using mobile threat defense software significantly reduces this risk. iPhone users benefit from iOS sandboxing and App Store review, though sophisticated malware occasionally bypasses these protections (Proofpoint, "What Is Smishing?").
Why are smishing attacks increasing?
Several factors drive growth: users inherently trust SMS more than email, mobile devices are often outside corporate security perimeters, SMS filtering technology lags far behind email security in maturity and deployment, the rise of BYOD policies creates visibility gaps for security teams, and attackers can now use AI to generate highly convincing personalized messages at scale. Additionally, SMS bypasses most organizational security infrastructure entirely—organizations investing billions in email security get zero benefit when attacks move to text messages (Cyvent, 2025; Proofpoint, 2024; SentinelOne, 2024).



