While Hollywood would have you believe that most high-profile 'hacks' involve highly-sophisticated, highly-technical, green-text-on-black-screen exploits, the reality is that many of the breaches that end up in the headlines begin with a socially-engineered employee.
After all, why spend the time and effort to develop the next big 'exploit', when you can just trick someone into handing over their credentials?
While most have heard of email-based social engineering (i.e., phishing) and phone-based social engineering (i.e., vishing), text-based social engineering (i.e., smishing) has quickly become a favorite of cybercriminals.
SMS phishing, commonly referred to as "smishing," is a social engineering attack where cybercriminals use deceptive text messages to lure individuals into revealing sensitive information, such as passwords or credit card details.
Nowadays, users have been conditioned to use SMS-based verification and messages as part of standard 2024 operating procedures (e.g., multifactor codes, delivery notifications, doctor appointment confirmations, etc.). With the increase of legitimate text traffic, identifying malicious or fraudulent messages has become more and more difficult.
Unlike phishing emails, smishing messages do not have to bypass email filters in order to make it to the targeted user; increasing the probability that a user will receive the message and have an opportunity to fall victim.
Smishing attacks are on the rise, presenting a significant cybersecurity threat to individuals and organizations.
At SEVN-X, we are consistently asked to perform phishing, vishing, and physical security social engineering as part of our penetration testing. In the last 6-12 months however, we have noticed a considerable uptick in requests for smishing campaigns to be included.
The results have been eye-opening and, in many cases, significantly more successful than traditional emails/phone calls.
During a recent project, we conducted an SMS-based social engineering campaign to test the security awareness of an organization’s employees.
To set the stage, we:
Within four hours, we had successfully obtained 10 sets of valid credentials (25%) from users during the campaign. As seen below, we were also able to use the text conversation to bypass multi-factor authentication controls.
Protection measures against smishing attacks are very similar to the phishing guidance people have been receiving for years:
References: