Cyber

Smishing — before you click another text message, read this

hands texting professional

Our phones are an extension of ourselves, helping us do everything from keeping in touch to streaming our favorite shows to sharing our adorable pets on social media. But with increased data usage comes the increased danger of getting your personal information stolen via your phone — which can lead to damaging consequences.

 

“Cybercriminals will continue to devise schemes to trick you into giving them an entryway into your digital world,” says Laura Bennett, Senior Vice President, e-Consumer North America for Blink by Chubb.

 

One such scheme is “smishing,” where hackers gain access to your data by using fake text messages. So, read (probably on your phone) about smishing scams and how to safeguard against them.

What is smishing?

You’re probably familiar with the terms phishing and spoofing, scams where bad actors send fake emails that claim that you’ve gotten some sort of prize or that urgent action is required on your account. Spoofing emails pretend to be from trusted, big-brand institutions, like major banks or retailers. These emails try to trick you into opening a link or file — which allows malicious software to be downloaded onto your computer and leads to your data being compromised.

 

The word smishing is a mash-up of SMS (aka texting) and phishing. A smishing scam is a version of phishing that’s done through spam text messages rather than fake emails-and, like spoofing, texts may seem to be from a trusted sender. The smishers steal your personal and financial data through your mobile device instead of from your computer. The result is the same as phishing: the hackers obtain enough of your info to be able to impersonate a digital you.

 

This can have serious consequences because…

Identity theft leads to financial theft

Cybercrime is on the rise. A 2020 report from the FBI’s Internet Crime Complaint Center1 includes information from 791,790 complaints of suspected internet crime — an increase of more than 300,000 complaints from 2019.

 

Much of that crime begins with stealing your online identity.

 

According to Bennett, “Identity thieves are highly skilled and sophisticated and employ time-honed techniques and technology tools to deceive you. They’ll try to steal the log-in credentials to your financial accounts, your email, and/or your mobile phone.” Their ultimate goal, she says, is “Moving money from your accounts to accounts they control.”

 

And your text message activity can be the open door, inviting cybercriminals in.

Why use spam text messages to target your data?

Cyberattack by smishing is attractive to hackers because text messages have qualities that put data thieves at an advantage:

 

  • Lack of authentication – SMS text senders are not verified beyond a phone number.
  • The odds we’ll answer – American adults open 99% of their texts.2
  • Location data – Your phone can provide smishers with your site location, which can make the scam text message seem more legit.
  • Speed – We generally text fast, which makes it easy for us to mistakenly open and click on fake texts.
  • Volume – More than six billion texts are sent every day; 97% of American adults text weekly. Good statistics for a criminal enterprise looking to exploit.

How to prevent getting caught in a smishing scam

The best way to avoid being smished is to be vigilant about your personal texting habits and security.

 

  • Ignore texts that seem “off” and don’t open text alerts you didn’t sign up for.
  • Block unwanted text senders and consider minimizing your text alerts to the most essential.
  • Don’t click on links in text messages unless you’re absolutely sure who the sender is and the purpose of the link.
  • Get a personal virtual private network (VPN), which will help protect against location-based smishers.
  • Use a two-factor authentication (2FA) app such as Authy or Google Authenticator, to eliminate the code-texting verification steps and increase the security.

The Blink Bottom Line

Getting smished is no joke — protect your identity and your finances with vigilance and cyber security best practices.

Blink℠ by Chubb® Cyber Insurance

Easy, effortless insurance for everyone.

Insights and expertise

We help you stay ahead and informed with these helpful tips and tricks for protecting your home, car, and more.
woman holding her phone
Cyber
Tips for avoiding identity theft | Chubb
Many sources for Identity Theft are out of your control. But you can control some potential sources of ID theft and reduce your chances of becoming a victim. Here are some ways.
woman working in home office
Cyber
10 tips to stay cyber safe when you’re working from home
Cyber criminals know that, with more people online, there are more ways to take advantage of vulnerabilities to gain access to protected and personal information.
upset woman with computer
Cyber
How to know if you’re a victim of identity theft
As we spend more of our lives online – working, going to school, shopping, and more – we face an increasing risk for identity fraud. That’s why we need to be aware of the top warning signs that indicate you may be a victim of identity theft.
person using tablet
Cyber
MISSING! What to do if your phone or computer is stolen
Acting quickly can help prevent bad actors from engaging in identity theft and other fraudulent activity.
payment with online banking
Cyber
5 steps to take if you believe your identity has been stolen
These proactive measures can help safeguard your personal information.
credit card and lock
Cyber
9 tips to help protect your identity during tax season
Tax season is an opportune time for identity theft. But if you know what to look for and what NOT to do, you can help protect your identity and keep your hard-earned money.
lock on keyboard
Cyber
Securing personal data with multifactor authentication
Cyber security is not something you want to risk. Two-factor authentication protects your data and identity against internet criminals.
two bully boys posting video
Cyber
9 ways to protect your kids from cyberbullies
With so much time spent on a computer, gaming system, tablet, or cell phone, it’s no wonder bullies are taking advantage of those in cyberspace. Learn more about the top ways to help protect your kids from cyberbullies.
woman holding a phone
Cyber
Do you need a social media policy for your nanny?
Does your nanny have a smartphone addiction? Not only can this impact his or her productivity, but it could put your family at risk. If your nanny posts your children's location or other personal details on social media, it could end up in the wrong hands of kidnappers or cybercriminals. Here's how to create a social media policy to keep your family safe.
phone notebook and glasses
Cyber
5 reasons to recycle your electronics, instead of chucking them
If you like to keep up with the latest technology, you probably have a pile of electronic castoffs somewhere in the house, garage or possibly in the garbage. But, it’s so much better -- for you and the planet -- to recycle them instead of throwing them away. Here’s why.

Find an Agent

Speak to an independent agent about your insurance needs.

This document is advisory in nature and is offered as a resource to be used together with your professional insurance advisors in maintaining a loss prevention program. It is an overview only, and is not intended as a substitute for consultation with your insurance broker, or for legal, engineering or other professional advice.

Chubb is the marketing name used to refer to subsidiaries of Chubb Limited providing insurance and related services. For a list of these subsidiaries, please visit our website at www.chubb.com. Insurance provided by ACE American Insurance Company and its U.S. based Chubb underwriting company affiliates. All products may not be available in all states. This communication contains product summaries only. Coverage is subject to the language of the policies as actually issued. Surplus lines insurance sold only through licensed surplus lines producers. Chubb, 202 Hall's Mill Road, Whitehouse Station, NJ 08889-1600.