As a kid, I remember my parents proving me with sound and prudent life advice all the time. I know I listened to most of it. I’m sure other great information went in one ear and out the other. That is what we do as youngsters.

Today, I am reminded of one valuable sound bite…….

What Happens After You Respond to a Smishing Text

When you receive a SMiShing text, what do you do? Do you do nothing? Do you respond? Let us assume you responded to a generic SmiShing text. We will walk through one of several response anatomies where you may have responded:

Two things have now taken place. You have validated the phone number is active. It is now known as a good number
Furthermore, your validated and known working phone number will be entered into an auto text-tool for further communication

Seems harmless; however, this is how the real SmiShing starts. The threat actors are starting to piece together a puzzle that is much larger than the three steps noted above. What is next? The SMiShing could stop here, but it is highly unlikely. If this is coming from a threat actor, you can be assured, this is only the beginning.

How Smishing Text Messages Trick You Into Sharing Personal Info

With the SMiShing text, did you provide: Your name by way of, “Hey, is this Frank?” “No, my name is John”

“Oh, John, sorry John.” I was reading a text from Frank and got you two mixed up,” might be a response from the threat actor.

This kind of back and forth will continue attempting to scrape you for more information while another member of the threat team starts working on more data, such as:

Checking other accounts that might use a phone number. An account like Facebook.

Let us assume again, for the sake of this article, you did use your phone number as your account login credentials to Facebook. If your security settings are not fully in place, the flood gates are now open. By looking up your phone number in Facebook, we can find:

  • Your full name

  • Where you are located

  • Your job

  • Your family members and pictures

  • Activities you enjoy

  • Pictures of your house and vehicles

    • Is your license plate visible.

  • Your “cycles”

    • When you might be at work

    • When your family, wife, husband, significant other may be alone

    • When you go on vacation

  • And the list goes on and on and on

Cybersecurity Advice That Still Rings True Today

I could write for hours with all the information that is now exposed and how that information can and will be used against you, your family, your pets, your friends, and many more important pieces of your life. We are human, we like to interact, but are you giving away too much information that, in of itself, is harmless?

Circling back to your parents and the great life advice they provided you. Seems there were right, after all.


DO NOT TALK TO STRANGERS

Need Help? Contact ION Technology Group

Contact ION Technology Group today or learn more at https://www.iontg.com/. We can also be contacted at 1.856.719.1818 and are available to assist you with your questions, formal presentations to your team, or if you do have an active concern, we can help you navigate your current scenario. Stay safe.

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Learn What Is a DNS Leak and How to Fix It