{"id":669,"date":"2020-02-18T13:15:00","date_gmt":"2020-02-18T13:15:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=669"},"modified":"2020-10-02T17:11:35","modified_gmt":"2020-10-02T17:11:35","slug":"what-is-sms-spoofing-how-can-you-prevent-it","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/","title":{"rendered":"What Is SMS Spoofing &#038; How Can You Prevent It?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Think spoofed text messages is a modern-day problem? They\nactually date back nearly a millennia&#8230;<\/h2>\n\n\n\n<p>SMS spoofing might be a 21st-century problem, but you&#8217;d be surprised to know that its roots are believed to go back by centuries. In 1271, Sultan Baybars, an Egyptian commander, successfully captured the formidable Krak des Chevaliers by handing the besieged knights a forged letter, supposedly from their commander, that instructed them to surrender. The knights surrendered in the end, and the letter <a href=\"https:\/\/en.wikipedia.org\/wiki\/Krak_des_Chevaliers\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">turned out to be fake.<\/a>&nbsp; <\/p>\n\n\n\n<p>Interesting? Maybe, yes. But as exciting as\nit may sound, this capability is undoubtedly destructive in nature when used\nwith malicious intentions. That brings me to &#8220;SMS spoofing,&#8221; the\nsubject that brought you here.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SMS Spoofing: What Is It? <\/h2>\n\n\n\n<p>Thanks to the people who name these terms,\nwe get a good idea of terms just by looking at it. If you think \u201cSMS spoofing\u201d\nis some kind of technique to defraud people using SMS, then you\u2019re absolutely\ncorrect. <\/p>\n\n\n\n<p>SMS spoofing is a technique that allows us\nto change the sender information on a text sent via the short message service\n(SMS) system. SMS text messages are used by cell phones, personal digital\nassistants, and similar devices and are typically just known as text messages. <\/p>\n\n\n\n<p>When you send a spoof text, they replace the\noriginating mobile number (sender ID) with alphanumeric text. In simpler words,\nSMS spoofing allows you to change the sender\u2019s display number. As it allows you\nto change the originator details, it\u2019s also regarded as \u201cSMS originator\nspoofing.\u201d<\/p>\n\n\n\n<p>Here\u2019s an interesting illustration of SMS spoofing:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"388\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-spoofing.png\" alt=\"\" class=\"wp-image-670\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-spoofing.png 500w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-spoofing-300x233.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption> Image source: <a href=\"https:\/\/github.com\/vpn\/SMSSpoof\/blob\/master\/README.md\">https:\/\/github.com\/vpn\/SMSSpoof\/blob\/master\/README.md<\/a> <\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">SMS Spoofing vs Smishing<\/h3>\n\n\n\n<p>Many people associate SMS spoofing with another technique called \u201c<a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-smishing-definition-examples-protection-tips\/\" target=\"_blank\" rel=\"noreferrer noopener\">smishing<\/a>.\u201d Some even believe them to be the same. While they both relate to <a href=\"https:\/\/sectigostore.com\/blog\/phishing-statistics-phishing-stats-to-help-avoid-getting-reeled-in\/\">phishing<\/a>, however, both are quite different. Smishing, the short form of SMS phishing, is a security attack in which the user is tricked into downloading a Trojan horse, virus or other malware via a text message. And as you now know, SMS spoofing has to do with making a message look like it\u2019s coming from another system or device. <\/p>\n\n\n\n<p>They both are totally different, right? So,\nwhy do people associate them even though they\u2019re entirely different? Well,\nthat\u2019s because they both are frequently used in combination to fool users. For\nexample, a scammer may spoof the text message sender name, turning it into a\nname that seems like the name of a bank and include a phishing message that\ntricks users into clicking on a link. That\u2019s how SMS spoofing and smishing are\ncommonly used to fool users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does SMS Spoofing Work?<\/h2>\n\n\n\n<p>As we saw, SMS spoofing allows you to send\nSMS impersonating another entity. This is done by changing the sender&#8217;s name,\nphone number, or both. Surprisingly, this is not at all hard to execute. <\/p>\n\n\n\n<p>In BackTrack and some other versions of\nKali Linux, there&#8217;s an SMS spoofing attack vendor tool in the social engineer\ntool kit. All it takes is this tool, and you can send a text message to someone\nusing the identity of whatever phone number\/sender name you want. <\/p>\n\n\n\n<p>Apart from using SET in Kali Linux, an even\nmore straightforward way to execute SMS spoofing is by using an online service.\nYes, you read it correctly; there are &#8220;businesses&#8221; offering you SMS\nspoofing services on the internet (we&#8217;ll talk about their legality later on). These\nplatforms are highly user-friendly; anyone with basic computer knowledge can\nsend spoofed messages. All you need to do is pay some money (very cheap, btw),\nadd the name that you want to display, and send the SMS to the people you want\nto send. Scary, isn&#8217;t it?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ways SMS Spoofing Is Misused<\/h2>\n\n\n\n<p>Although it&#8217;s a technology, SMS spoofing has become a trick used by marketers, hackers, and fraudsters to <a href=\"https:\/\/www.fcc.gov\/document\/fcc-bans-malicious-spoofing-text-messages-foreign-robocalls-0\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">mislead users with fake displayed sender information<\/a>. It&#8217;s a medium that can be used and modified in many ways to achieve the intended result. Let&#8217;s see some of the most ways SMS spoofing is misused.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">False Sender Company Name<\/h3>\n\n\n\n<p>We all have received an SMS that pretends\nto be from a well-known company, but in the end, it turns out to be a fake one.\nWell, that\u2019s SMS spoofing for you. Many marketers and fraudsters send SMSes\nthat pretend to be from a well-known company. For example, a fraudster could\nchange the sender&#8217;s name to Vodafone and tell you that your contract is due for\nrenewal. Not all people will believe this, but what about the ones whose\ncontract is about to expire? If they see this SMS, they&#8217;re highly likely to\nrespond to it. And that&#8217;s precisely what the scamsters want. Isn\u2019t it?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fake Money Transfers<strong><\/strong><\/h3>\n\n\n\n<p>One of the smartest ways that fraudsters use\nSMS spoofing is in offline shopping. In this trick, the fraudster visits a\nretail store (such as high-end electronic equipment, jewellery, branded\nmerchandise, etc.) and purchases multiple items. For payment, the fraudster\nasks for the bank details of the store so that they can transfer the money\nonline. <\/p>\n\n\n\n<p>Now, if the fraudster knows about the store outlet\u2019s phone number on\nwhich the bank sends SMSes for updates, they (the fraudster) can access an SMS\nspoofing website and use it to send a fraudulent SMS. The message is manipulated\nso it appears to come from the bank as it would contain the store\u2019s account\nnumber (hashing all but the last four digits), the amount transferred, and the\ntransaction date. This dupes the SMS recipient into believing that the \u201cbuyer\u201d\nhas made the payment and allows them to complete the purchase. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Personal Agenda<\/h3>\n\n\n\n<p>AsSMS spoofing gives you the power\nto create your identity (and impersonate others), it can be used to carry out a\npersonal agenda against a person. This could be in the form of a prank,\nstalking, tricking, or abusing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Extract Sensitive Information<\/h3>\n\n\n\n<p>What fraudsters and scamsters often do is send\nSMSes that prompt users into taking immediate actions. Not long ago, I received\nan SMS from a supposed e-wallet service saying that they will disable my\naccount within 24 hours, and that I&#8217;ll lose all of my money if I don&#8217;t submit\nmy documents. The message included a link that I was supposed to click on that\nwould direct me to log in and provide information. <\/p>\n\n\n\n<p>Unsurprisingly, the web page that the link directed looked almost\nthe same as the website of the actual wallet provider, but it wasn&#8217;t. If I had\nlogged in without looking at the URL, I&#8217;d have given my credentials to the\nfraudsters behind this scam, and they could&#8217;ve taken away all my money. Such\nscams are becoming more prevalent these days.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Legitimate Uses of SMS Spoofing<\/h2>\n\n\n\n<p>&#8220;Legitimate uses of SMS spoofing?\nReally?&#8221; \u2013 If this was your reaction after reading the header, then we\ncan&#8217;t blame you. After all, it looks like a trick to defraud innocent people.\nDoesn&#8217;t it? It surely does, but there&#8217;s more to SMS spoofing than it meets the\neye. SMS spoofing has its advantages, and it&#8217;s being used in many places. Let&#8217;s\nhave a look at some of them.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Bulk Messaging Services: <\/strong>Bulk SMS services are the ones who send out SMSes from a computer\nnetwork. They must spoof their number so that people can identify them.<\/li><li><strong>Official Messages:<\/strong> When organizations such as banks, social media platforms, email\nproviders, mobile network providers, etc. want to send official messages to\ntheir customers, they must do it in a way that users can identify them. So,\nthey replace their number with their company name. <\/li><li><strong>Identity Protection:<\/strong> In some cases, protecting the sender&#8217;s identity is of paramount of\nimportance. Whistle-blowers are the best example of this as they might be\nwanting to communicate in such a way that doesn\u2019t reveal their identity. <\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Users Can Protect Themselves Against SMS Spoofing<\/h2>\n\n\n\n<p>When it comes to protecting digital\nsecurity, there\u2019s a bit of education as far as emails and websites are\nconcerned. However, SMS security is one such area that hasn\u2019t received the\nattention it deserves. That\u2019s why, as a user, you must learn how you can protect\nyourself from being scammed. Here are some tips that will help you:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You should avoid clicking on\nlinks you receive via SMS as much as possible. If the SMS is asking you to take\nurgent action, then you should visit the website directly and not click on the\nSMS link.<\/li><li>Don\u2019t get tempted by \u201ctoo good\nto be true\u201d offers or news such as winning a lottery or heavenly discounts.\nWhile that free Chipotle burrito offer may be real, it also may be a scam.\nExercise caution.<\/li><li>Don\u2019t click on the URLs\nmentioned in the \u201cpassword reset\u201d SMS messages.<\/li><li>If you receive a fund transfer\nupdate through SMS, you should always insist on checking your bank\/wallet\nbalance by logging in to your banking website or mobile app directly. Again, don\u2019t\nautomatically click on a link you receive via SMS! <\/li><li>Beware of SMSes about\nverification codes, especially if you didn\u2019t request a password reset or sign\nup to a service that uses two-factor authentication.<\/li><li>Share your phone number only in\nurgent cases.<\/li><li>Banks, service providers, and\ntelecommunication companies don\u2019t ever ask you for your personal details\nthrough SMS. So, don\u2019t ever give your details through SMS!<\/li><li>Contact law enforcement and\nyour network provider if you receive a spoof text message.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How Organizations Can Protect Their Brands Against SMS\nSpoofing<\/h2>\n\n\n\n<p>Not only do customers need to be aware of\nspoof text messages, but organizations also need to be wary of SMS spoofing as\nwell for two reasons. One, these scams are quite easy to fall for. If scammed,\nyou could incur a hefty financial loss, and that\u2019s not something you want,\nright? And the second reason is that if your organization\u2019s name and brand are\nused by cybercriminals in SMS spoofing attacks, it can have a major impact on\nyour reputation. &nbsp;<\/p>\n\n\n\n<p>Here are some of the steps you could take\nto stay a step ahead of the fraudsters:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If you receive a fund transfer\nupdate through SMS, you should always insist on checking your bank\/wallet\nbalance by logging in. <\/li><li>Rely on conventional payment\nmethods (i.e., cash, debit, or credit card).<\/li><li>Contact law enforcement and\nyour network provider if you receive a spoof SMS.<\/li><li>If someone uses your organization\u2019s\nname or information in SMS spoofing scams, report it to the Federal\nCommunications Commission (FCC) and the police. <\/li><li>Avoid using your personal phone\nnumber for SMS updates and keep a separate phone number for the same. And of\ncourse, don&#8217;t share this number with the outside world.<\/li><li>Raise awareness about SMS spoofing\namong your customers so that they don\u2019t fall for spoofing attacks that target\nyour company.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Last Word<\/h2>\n\n\n\n<p>One of my best friends was so afraid of\ndoing anything online that she\u2019d wait for half an hour in a bank to do a\ntransaction that could be easily completed online within minutes. Recently,\nshe\u2019s started to do some stuff online \u2014 but that, too, with the eye of a cat\nthat wants to protect itself from the dogs. <\/p>\n\n\n\n<p>Yes, my friend comes across as a bit of a freak and I like to make fun of her for it. However, there\u2019s something that we all could learn from her. If we practice even a quarter of her awareness, we could easily stay away from SMS spoofing and spoofed text messages. It\u2019s all about the eyes, my friend!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Think spoofed text messages is a modern-day problem? They actually date back nearly a millennia&#8230; SMS spoofing might be a 21st-century problem, but you&#8217;d be surprised to know that its&#8230;<\/p>\n","protected":false},"author":11,"featured_media":671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[30,39],"class_list":["post-669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-phishing","tag-spoofing","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is SMS Spoofing &amp; How Can You Prevent It? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"If you think \u201cSMS spoofing\u201d is some kind of technique to defraud people using SMS, then you\u2019re absolutely correct. Here&#039;s what to know about this threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is SMS Spoofing &amp; How Can You Prevent It? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"If you think \u201cSMS spoofing\u201d is some kind of technique to defraud people using SMS, then you\u2019re absolutely correct. Here&#039;s what to know about this threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-18T13:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T17:11:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jay Thakkar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Thakkar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/\"},\"author\":{\"name\":\"Jay Thakkar\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/2bd5183b4382b932289602103813f969\"},\"headline\":\"What Is SMS Spoofing &#038; How Can You Prevent It?\",\"datePublished\":\"2020-02-18T13:15:00+00:00\",\"dateModified\":\"2020-10-02T17:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/\"},\"wordCount\":1964,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/sms-phishing.jpg\",\"keywords\":[\"phishing\",\"spoofing\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/\",\"name\":\"What Is SMS Spoofing & How Can You Prevent It? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/sms-phishing.jpg\",\"datePublished\":\"2020-02-18T13:15:00+00:00\",\"dateModified\":\"2020-10-02T17:11:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/2bd5183b4382b932289602103813f969\"},\"description\":\"If you think \u201cSMS spoofing\u201d is some kind of technique to defraud people using SMS, then you\u2019re absolutely correct. Here's what to know about this threat.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/sms-phishing.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/sms-phishing.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Illustration of a hacker SMS phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-sms-spoofing-how-can-you-prevent-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is SMS Spoofing &#038; How Can You Prevent It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/2bd5183b4382b932289602103813f969\",\"name\":\"Jay Thakkar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fe143aa4db3371a98a5b1a48c41235525303cf3124b8b20c3ee73d8c2e68c28c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fe143aa4db3371a98a5b1a48c41235525303cf3124b8b20c3ee73d8c2e68c28c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fe143aa4db3371a98a5b1a48c41235525303cf3124b8b20c3ee73d8c2e68c28c?s=96&d=mm&r=g\",\"caption\":\"Jay Thakkar\"},\"description\":\"Jay is a cybersecurity writer with an engineering background. A regular contributor on InfoSec Insights and Hashed Out, Jay covers encryption, privacy, cybersecurity best practices, and related topics in a way that an average internet user can easily relate.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is SMS Spoofing & How Can You Prevent It? - InfoSec Insights","description":"If you think \u201cSMS spoofing\u201d is some kind of technique to defraud people using SMS, then you\u2019re absolutely correct. Here's what to know about this threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"What Is SMS Spoofing & How Can You Prevent It? - InfoSec Insights","og_description":"If you think \u201cSMS spoofing\u201d is some kind of technique to defraud people using SMS, then you\u2019re absolutely correct. Here's what to know about this threat.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/","og_site_name":"InfoSec Insights","article_published_time":"2020-02-18T13:15:00+00:00","article_modified_time":"2020-10-02T17:11:35+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-phishing.jpg","type":"image\/jpeg"}],"author":"Jay Thakkar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Thakkar","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/"},"author":{"name":"Jay Thakkar","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/2bd5183b4382b932289602103813f969"},"headline":"What Is SMS Spoofing &#038; How Can You Prevent It?","datePublished":"2020-02-18T13:15:00+00:00","dateModified":"2020-10-02T17:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/"},"wordCount":1964,"commentCount":0,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-phishing.jpg","keywords":["phishing","spoofing"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/","url":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/","name":"What Is SMS Spoofing & How Can You Prevent It? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-phishing.jpg","datePublished":"2020-02-18T13:15:00+00:00","dateModified":"2020-10-02T17:11:35+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/2bd5183b4382b932289602103813f969"},"description":"If you think \u201cSMS spoofing\u201d is some kind of technique to defraud people using SMS, then you\u2019re absolutely correct. Here's what to know about this threat.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-phishing.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/02\/sms-phishing.jpg","width":1600,"height":1000,"caption":"Illustration of a hacker SMS phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is SMS Spoofing &#038; How Can You Prevent It?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/2bd5183b4382b932289602103813f969","name":"Jay Thakkar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fe143aa4db3371a98a5b1a48c41235525303cf3124b8b20c3ee73d8c2e68c28c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fe143aa4db3371a98a5b1a48c41235525303cf3124b8b20c3ee73d8c2e68c28c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe143aa4db3371a98a5b1a48c41235525303cf3124b8b20c3ee73d8c2e68c28c?s=96&d=mm&r=g","caption":"Jay Thakkar"},"description":"Jay is a cybersecurity writer with an engineering background. A regular contributor on InfoSec Insights and Hashed Out, Jay covers encryption, privacy, cybersecurity best practices, and related topics in a way that an average internet user can easily relate."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=669"}],"version-history":[{"count":3,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/669\/revisions"}],"predecessor-version":[{"id":1594,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/669\/revisions\/1594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/671"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}