Social Engineering in the News: SMiShing – Security Boulevard

Employees are increasingly accessing corporate information and accounts from their personal phones. As a result, SMiShing attacks now pose a serious threat to corporate information. How serious is this threat? Consider this statistic; 20% of energy industry employees were exposed to a mobile phishing attack in the first half of 2021. That is a 161% increase from the second half of 2020. Across the board, companies lost an alarming $54,241,075 because of social attacksincluding SMiShing according to the 2020 FBI Internet Crime Complaint Center report.

The word SMiShing comes from combining SMS (Short Message Service), the technology behind texting, with phishing, the practice of stealing personal or financial information through deceptive emails. Basically, SMiShing is phishing but by another means, namely text messages on mobile devices.

Image: https://thehackernews.com/2021/12/researchers-warn-iranian-users-of.html

Your companys best defense is to educate employees and ensure they understand the threats posed by SMiShing attacks. The Social-Engineer Teaming Service is a valuable tool that enables organizations to evaluate their unique attack surface to social engineering attacks. Upon request, we can include a SMiShing part to our SE (Social-Engineer) Teaming Service engagement. This will test your organizations human network for their understanding of policies relating to SMS attacks.

*** This is a Security Bloggers Network syndicated blog from Social-Engineer, LLC. authored by Social-Engineer. Read the original post at: https://www.social-engineer.com/social-engineering-in-the-news-smishing/

Read the original:

Social Engineering in the News: SMiShing - Security Boulevard

Related Posts

Comments are closed.