KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

SMiShing is the mobile version of phishing. Instead of catching the target with an email message, SMiShing attempts are sent via SMS, or text. Other than the method of introduction, there is little difference between SMiShing and the traditional phishing. For instance, both require the target to take the phisher (or, in the case of SMiShing, ‘smisher’) at their word and comply with any instructions.

Despite the general public learning to be more wary of cyber threats that come through the computer, there is still a lack of anticipation that these threats can also come in via cell phone. SMiShing is meant to use the disguise of a familiar contact to steal credentials and data, or delete it entirely.

A “smisher” will use any stolen credentials to access the user’s accounts and cause all sorts of chaos for them. For example, if you have any sensitive client information located on-site or stored in an online account, hackers can gain access to it with your credentials. Another way that a smisher might take advantage of you is by sending you a fake link via an SMS and request that you authenticate yourself or face a recurring fee. If this is the case, you should report the attempt to IT and give the smisher no response.

Spotting a SMiShing Scam
The first thing you should do if you receive a message that you suspect is part of a SMiShing attempt is to reach out to the supposed sender to confirm that it was legitimate. This should be done via some means other than text. Calling the contact or one of their representatives can help you to judge if the message is authentic or not without leaving yourself vulnerable to further threats.

It more or less boils down to leaving SMS messages from unknown senders alone. This is especially true of ‘5000’ numbers, which indicate that the message was originally an email sent as a text. Scammers have been known to use this tactic in their schemes.

Furthermore, messages with downloadable applications are another warning sign, as this is a common method of infecting a mobile device with malware. A good rule of thumb is to only download and utilize apps that come from your mobile device’s official marketplace, as those that don’t are very likely to turn out to be malware in disguise.

How To Protect Yourself
As mentioned above, if there is any doubt about the validity of a message, confirm its authenticity through an alternative line of communication. For added security, it helps to augment the practices we’ve outlined here with the use of a virtual private network, or VPN, safeguarding your mobile activity.

For help in securing your business devices and communications, call KT Connections at 605-341-3873.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email Business Computing Cloud Internet malware Network Security Google software Business Ransomware Efficiency User Tips Backup Data Computer IT Support Microsoft Android Money Facebook Hardware Productivity Managed IT Services IT Support Small Business Network Smartphone Windows Hosted Solutions cybersecurity Mobile Device Management VoIP Gmail IT Management Artificial Intelligence Microsoft Office Phishing communications Cloud Computing Data Management Business Continuity Mobile Devices Operating System Outsourced IT data breach End of Support Apple Encryption IT Services Alert Smartphones Outlook Bandwidth BDR Business Management Windows 10 Windows 10 Data storage Unified Communications Social Media Nextiva Upgrade Antivirus Internet of Things security cameras Passwords Disaster Recovery Update Communication Browser Patch Management Save Money vulnerability SaaS Saving Money Innovation Document Management Collaboration Information Technology Managed IT Services IoT Law Enforcement Hard Drive Analytics Robot Project Management security solutions Remote Monitoring Networking Firewall Big Data Customer Service The Internet of Things Apps Automation Search Productivity IBM Server Gadgets Google Maps BYOD Cost Management WiFi Start Menu Google Wallet YouTube Google Docs Politics Legal Scam News Lunch and Learn Best Practice Data Recovery Events App Office 365 Word Event Marketing Local Buzz Spam Drones Data Backup Access Control South Dakota History Bluetooth Rapid City Quick Tips Specifications File Sharing Websites Penetration Testing user confidence Access Virtual Desktop Office Tips Web Servers DDoS attacks Applications Printer Music Data Security Local Technology Event Virtual Machines Safety IoT Devices Television Workers Software as a Service Solid State Drive Physical Security Phishing Scams Spyware DDoS Internet 101 Redundancy Tips and Tricks Audit Sales Tax Google Drive security precautions Mixer Government Writing Risk Creep Mouse Samsung Virus Cryptocurrency IT Consultation LastPass communication device Internet Connected Devices Black Market Maintenance Telephony Vendors Virtual Reality IT for Oil Companies Laptop SharePoint Tablets Law IT Cleaning IT Assessment Cache Social Engineering business owner Managed Service Provider How To Hacking Fortinet Mobility VoIP Community Involvement Retail Risk Management Memory Tablet IT Security Lawyers IT Strategy face communication solutions Emergency Business Growth Business Security Social Download vulnerabilities Kaseya identity theft SOX Network Congestion Freedom of Information IT Solutions Administration surveillance cameras Virtualization Communications Education Deep Learning Business Technology Content Filtering Printing Information Security Time Management healthcare Dell ’s Sonicwall Global Management System Experience Microsoft Office 365 Kaseya Connect media experience Sarbanes-Oxley Act Fake News Attorneys Computer Care Trend Micro Phone System AtomBombing Office Disaster Managed IT Downloads Distributed Denial of Service Email Security Unified Threat Management tool Password Sports Microsoft Office 365 features Conference information End User Testing Microsoft Excel Running Cable Managed Services Chamber of Commerce Wireless Technology Google Play Store Hardware as a Service LiFi appointment Vendor Management Uninterrupted Power Supply Google Calendar Streaming Media Flash Cabling Society HaaS Visible Light Communication enterprise productivity software Monitors Data Protection Knowledge Hosted Solution Business Communications Webcam Business Comunications Windows XP Settings VPN botnet attack Windows 8 Press Release camera Vendor Mangement Website Microsoft Bookings Displays Corporate Profile Tech Terms Programming Comparison Touchscreen Budget Remote Computing password manager LastPass Compliance macbook Workplace Tips Worker botnet Rebrand Tech Support Digital Proactive IT Hack Business Mangement Advertising booking process Fast food Cloud Backup Machine Learning Paperless Office Hiring/Firing Bring Your Own Device Language Administrator Relocation Hacker Miscellaneous base infrastructure CCTV Hacks Holiday Automobile security solution IT service Web Server Unified Threat Management Notifications Telephone Systems Business Metrics Meetings end-of-support date Ordinary Computers Health holiday season Emails Banking Phone Systen Rental Service Chromebook UTM Tracking Flexibility quantum computers 3D Printing holidays Cortana Supercomputer Threat management Reliable Computing Users scammers CrashOverride Twitter Work/Life Balance IT Consultant Scalability network security professionals scams G Suite Training Computer Malfunction Travel Playbook Processors Wi-Fi collaboration capabilities Employer-Employee Relationship Employer Employee Relationship Messenger Sync Digital Payment Private Cloud breach methods Microchip Documents In Internet of Things Books Text Messaging PDF Motion Sickness Public Cloud Taxes Computing Marketing Reading