{"id":1917,"date":"2023-07-19T05:01:38","date_gmt":"2023-07-19T05:01:38","guid":{"rendered":"https:\/\/qorosec.com\/?p=1917"},"modified":"2023-07-19T05:01:38","modified_gmt":"2023-07-19T05:01:38","slug":"what-is-smishing","status":"publish","type":"post","link":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/","title":{"rendered":"What is Smishing?"},"content":{"rendered":"<p>There are many different types of social engineering attacks. From phishing to spear-phishing, and vishing, the list keeps growing. One common type of social engineering is smishing. Smishing is a technique in which hackers use a compelling text message to trick their victims into taking an unwanted action. Most likely, you\u2019ve received a smishing attack on your personal mobile device. But did you know these attacks target businesses too? In this blog post, we will outline how it works and how to best prevent it from impacting your business.<\/p>\n<p><strong>How It Works <\/strong><\/p>\n<p>The word smishing is a combination of Short Message Service (SMS) + phishing. Both techniques are designed to send convincing messages that entice users to take an unwanted action: smishing via text message and phishing via email. Smishing can be sent to anyone with a valid phone number.<\/p>\n<p>Hackers know that people are more inclined to quickly view and answer text messages compared to their emails. With their guard let down, hackers can convince someone to act quickly without thinking. These messages are always going to look and feel urgent. Hackers want you to act before you think, which is why many smishing attacks are successful.<\/p>\n<p>Hackers know that people are more inclined to quickly view and answer text messages compared to their emails. With their guard let down, hackers can convince someone to act quickly without thinking. These messages are always going to look and feel urgent. Hackers want you to act before you think, which is why many smishing attacks are successful.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png\" width=\"1600\" height=\"500\" \/><\/p>\n<p>Smishing has several goals hackers look to achieve. The most common are:<\/p>\n<ul>\n<li>\n<h6>Getting users to submit sensitive info<\/h6>\n<\/li>\n<li>\n<h6>Download malware<\/h6>\n<\/li>\n<li>\n<h6>Respond to the attack<\/h6>\n<\/li>\n<\/ul>\n<p>Not all smishing is delivered via a text message. With the variety of messaging apps on your phone, hackers have a ton of choices on the channel they use to deliver their compelling trick. It\u2019s easy for a hacker to look like someone else in a smishing attack. That\u2019s because most SMS messages are not authenticated and can be sent by anyone without validation of the sender. Here\u2019s a few of the techniques hackers use to deliver the attack:<\/p>\n<p><strong>Message spoofing:<\/strong>\u00a0A hacker uses special tools or services to spoof or mimic the number of a trustworthy person or service.<\/p>\n<p><strong>Automated Vishing<\/strong>:\u00a0A smishing attack might ask you to call back a phone number or provide a pin or password to \u201cconfirm\u201d your information.<\/p>\n<p><strong>Two Factor Tricksters:<\/strong> Certain smishing attacks focused on tricking you into giving up your multi-factor code.<\/p>\n<p><strong>How to Protect Your Business?\u00a0<\/strong><\/p>\n<p>Opt out of opting out! The best action is no action. Don\u2019t reply to an unsolicited message since that will confirm your real number, leaving you as a target for additional attacks. If you get an unsolicited message, your first reaction should always be to stop and think if it\u2019s legit. Never give away sensitive information via a text or messaging app. Always be vigilant, if there\u2019s a link in the message, don\u2019t click it. If you&#8217;re concerned about the authenticity of a message, directly contact the service or person trying to interact with you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many different types of social engineering attacks. From phishing to spear-phishing, and vishing, the list keeps growing. One common type of social engineering is smishing. Smishing is a technique in which hackers use a compelling text message to trick their victims into taking an unwanted action. Most likely, you\u2019ve received a smishing attack &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/\"> <span class=\"screen-reader-text\">What is Smishing?<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-1917","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Smishing? - Qorosec - Software Testing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Smishing? - Qorosec - Software Testing\" \/>\n<meta property=\"og:description\" content=\"There are many different types of social engineering attacks. From phishing to spear-phishing, and vishing, the list keeps growing. One common type of social engineering is smishing. Smishing is a technique in which hackers use a compelling text message to trick their victims into taking an unwanted action. Most likely, you\u2019ve received a smishing attack &hellip; What is Smishing? Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Qorosec - Software Testing\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-19T05:01:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#\\\/schema\\\/person\\\/6e2825b913dd2659ac260a33a47dc85b\"},\"headline\":\"What is Smishing?\",\"datePublished\":\"2023-07-19T05:01:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/\"},\"wordCount\":531,\"publisher\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.yournucleus.ca\\\/hs-fs\\\/hubfs\\\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/\",\"url\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/\",\"name\":\"What is Smishing? - Qorosec - Software Testing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.yournucleus.ca\\\/hs-fs\\\/hubfs\\\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png\",\"datePublished\":\"2023-07-19T05:01:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.yournucleus.ca\\\/hs-fs\\\/hubfs\\\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png\",\"contentUrl\":\"https:\\\/\\\/blog.yournucleus.ca\\\/hs-fs\\\/hubfs\\\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/2023\\\/07\\\/19\\\/what-is-smishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/qorosec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Smishing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#website\",\"url\":\"https:\\\/\\\/qorosec.com\\\/\",\"name\":\"Qorosec - Software Testing\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/qorosec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#organization\",\"name\":\"Qorosec - Software Testing\",\"url\":\"https:\\\/\\\/qorosec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/qorosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/qorosec-8.png\",\"contentUrl\":\"https:\\\/\\\/qorosec.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/qorosec-8.png\",\"width\":499,\"height\":103,\"caption\":\"Qorosec - Software Testing\"},\"image\":{\"@id\":\"https:\\\/\\\/qorosec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/qorosec.com\\\/#\\\/schema\\\/person\\\/6e2825b913dd2659ac260a33a47dc85b\",\"name\":\"admin\",\"sameAs\":[\"https:\\\/\\\/qorosec.com\"],\"url\":\"https:\\\/\\\/qorosec.com\\\/index.php\\\/author\\\/admin_oudm714c\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Smishing? - Qorosec - Software Testing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/","og_locale":"en_US","og_type":"article","og_title":"What is Smishing? - Qorosec - Software Testing","og_description":"There are many different types of social engineering attacks. From phishing to spear-phishing, and vishing, the list keeps growing. One common type of social engineering is smishing. Smishing is a technique in which hackers use a compelling text message to trick their victims into taking an unwanted action. Most likely, you\u2019ve received a smishing attack &hellip; What is Smishing? Read More &raquo;","og_url":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/","og_site_name":"Qorosec - Software Testing","article_published_time":"2023-07-19T05:01:38+00:00","og_image":[{"url":"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#article","isPartOf":{"@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/"},"author":{"name":"admin","@id":"https:\/\/qorosec.com\/#\/schema\/person\/6e2825b913dd2659ac260a33a47dc85b"},"headline":"What is Smishing?","datePublished":"2023-07-19T05:01:38+00:00","mainEntityOfPage":{"@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/"},"wordCount":531,"publisher":{"@id":"https:\/\/qorosec.com\/#organization"},"image":{"@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/","url":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/","name":"What is Smishing? - Qorosec - Software Testing","isPartOf":{"@id":"https:\/\/qorosec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#primaryimage"},"image":{"@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png","datePublished":"2023-07-19T05:01:38+00:00","breadcrumb":{"@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#primaryimage","url":"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png","contentUrl":"https:\/\/blog.yournucleus.ca\/hs-fs\/hubfs\/endpoint%20security.png?width=1600&amp;height=500&amp;name=endpoint%20security.png"},{"@type":"BreadcrumbList","@id":"https:\/\/qorosec.com\/index.php\/2023\/07\/19\/what-is-smishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/qorosec.com\/"},{"@type":"ListItem","position":2,"name":"What is Smishing?"}]},{"@type":"WebSite","@id":"https:\/\/qorosec.com\/#website","url":"https:\/\/qorosec.com\/","name":"Qorosec - Software Testing","description":"","publisher":{"@id":"https:\/\/qorosec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/qorosec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/qorosec.com\/#organization","name":"Qorosec - Software Testing","url":"https:\/\/qorosec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/qorosec.com\/#\/schema\/logo\/image\/","url":"https:\/\/qorosec.com\/wp-content\/uploads\/2023\/04\/qorosec-8.png","contentUrl":"https:\/\/qorosec.com\/wp-content\/uploads\/2023\/04\/qorosec-8.png","width":499,"height":103,"caption":"Qorosec - Software Testing"},"image":{"@id":"https:\/\/qorosec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/qorosec.com\/#\/schema\/person\/6e2825b913dd2659ac260a33a47dc85b","name":"admin","sameAs":["https:\/\/qorosec.com"],"url":"https:\/\/qorosec.com\/index.php\/author\/admin_oudm714c\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=1917"}],"version-history":[{"count":1,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1917\/revisions"}],"predecessor-version":[{"id":1918,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1917\/revisions\/1918"}],"wp:attachment":[{"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=1917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/categories?post=1917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qorosec.com\/index.php\/wp-json\/wp\/v2\/tags?post=1917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}