What smishing looks like: Real SMS phishing examples
Smishing attacks can spoof just about anyone. Banks, package deliveries, government offices... the list goes on. In 2024, tax-related smishing scams cost victims an average of $8,199 per person, with messages like "IRS ALERT: You are owed a $969 refund."
One of the most common smishing lures is fake package tracking messages. “Package delivery delayed, confirm address here,” or “Delivery attempted. Reschedule here.” The link either downloads malware or is a credential harvester.
Banking or payment confirmations leverage the threat of money loss: “Suspicious activity detected on your account. Verify here to avoid suspension.” The fear factor causes immediate stress reactions, and people enter their credentials before thinking.
Password reset texts create a false sense of urgency. The text message says someone is actively attacking your account, and you need to “secure it” by clicking their link and resetting it.
HR/IT/management impersonation targets employees directly. These texts exploit workplace trust and authority:
-
“Hey, this is David from IT. Your email password expires today. Reset it here: [link]”
-
“This is Sarah from leadership. I need your help with something urgent. Can you handle a task for me really quickly?”
These workplace smishing attacks are dangerous because they steal credentials that can lead to full corporate breaches.