Back

What Is Smishing? How SMS Phishing Attacks Work and How to Stop Them

Lior Liberman
Lior Liberman
May 7, 2026
Insights
What Is Smishing? How SMS Phishing Attacks Work and How to Stop ThemBright curved horizon of a planet glowing against the dark backdrop of space.Bright curved horizon of a planet glowing against the dark backdrop of space.

"Your Microsoft 365 session has expired. Re-authenticate to maintain access." The text arrives while you are between meetings, from a number you do not recognize, with a link to what looks like your company's login page. You have seen these forwarded to the help desk. You have fielded the tickets. You know the pattern.

Smishing is SMS-based phishing, and the example above is typical: a fabricated security alert pushing the recipient toward a credential-harvesting page, on a phone, in a context where the usual scrutiny cues are missing.

The mechanics overlap with email phishing, but the channel changes how victims receive and respond. The message itself is rarely the worst part. The damage comes from what happens after a victim engages: a credential entered, a session token captured, an MFA code shared. That is a different problem with a different defense surface, and it is where most organizations underinvest.

TL;DR:

  • Smishing is phishing delivered over SMS. The attack structure is familiar, but the channel exploits different trust signals, faster response patterns, and weaker security infrastructure than email.
  • Most smishing defense is policy and people. Telephony filtering and mobile threat defense reduce volume, but the most reliable defenses are clear "never share" rules for MFA codes and credentials, documented contact channels, and verification practices employees actually follow.
  • The most damaging outcome is not the message. It is what happens after: an MFA prompt approved, a credential entered, a session token captured.
  • Smishing rarely operates alone. It is increasingly part of multi-channel campaigns combining SMS, voice calls, email, and fake support sites. Defending against the message alone does not defend against the campaign.

What Is Smishing?

Smishing is a social engineering technique where attackers use text messages to trick people into revealing credentials, sharing MFA codes, installing malicious software, or taking actions that lead to account compromise. Like its sibling techniques, smishing relies on pretexting: constructing a fabricated scenario or identity to establish trust before asking the victim to take an action.

Smishing sits within a broader family of channel-specific social engineering. Email phishing targets inboxes. Vishing targets voice calls. Spear phishing uses prior reconnaissance to personalize lures, a methodology that transfers directly to SMS. The underlying mechanics are consistent: an attacker creates urgency, impersonates a trusted entity, and pushes the victim toward an action.

Why Smishing Is So Effective

SMS as a channel lowers people's guard in ways email no longer does. The controls built for email (gateway filtering, URL rewriting, DMARC authentication) provide no coverage for SMS-delivered lures. An attacker who pivots from email to SMS inherits none of the defenses the target has spent years building.

Mobile context compounds the problem. People read texts while walking, between meetings, or mid-task, in moments where careful scrutiny is less likely. Sender IDs can be spoofed with no authentication check to fail. Urgency language ("Your account will be closed today") pushes fast reactions on a channel where reactions are already fast. And because SMS is also used for legitimate and time-sensitive communications like banking alerts and MFA codes, many recipients extend it more default trust than they would an unexpected email.

This is why "just train people to recognize phishing" does not transfer cleanly from email to SMS. The Verizon Mobile Security Index found that in two out of five organizations, between 25% and 50% of all employees failed smishing simulations, a failure rate that reflects structural channel advantages for attackers, not a deficit in awareness training alone.

How Smishing Attacks Work

The mechanics are predictable. An attacker obtains phone numbers, crafts a pretext, abuses weaknesses in the SMS ecosystem, and pushes the victim toward a link, a callback number, or an instruction to share information.

1. Phone Number Sourcing

Attackers source numbers from breach dumps, data brokers, and scraped public directories. Lists are often segmented by geography, employer, or industry to support more targeted pretexts.

2. Pretext Crafting

The scenario triggers urgency or familiarity: a missed delivery, a bank fraud alert, a help desk verification request, or a message from a CEO about a quick favor. The pretext matches what the victim expects to receive via text, which is what makes it land.

3. Sender ID and URL Manipulation

SMS lacks the mature sender authentication controls common in email. Sender IDs can be spoofed to mimic banks, carriers, or internal systems, and the recipient often has no practical way to verify whether a number actually belongs to the brand it claims.

Unlike email, the SMS protocol provides no equivalent authentication framework such as DKIM, SPF, or DMARC. URLs are often shortened, typosquatted, or routed through redirects before landing on the final page, making it harder for the recipient to evaluate the destination at a glance.

4. Payload Delivery

The attacker wants the victim to take one of a small set of actions: click a link to a credential harvesting page, call a fake support line for voice-based social engineering, install a malicious app or configuration profile, or reply directly with an MFA code, password, or other sensitive detail.

Across all four stages, the design principle is speed. The flow compresses the window between message receipt and victim action so there is no time to verify. Unlike email, where users may pause to inspect headers, hover over links, or wait until they are back at a desk, SMS is read on a phone within seconds of arrival, often in a context where the recipient is already multitasking. Attackers reinforce that tempo with countdown language, threats of account suspension, and pretexts that imply something has already gone wrong.

Common Smishing Scenarios

Smishing scenarios fall into recognizable patterns at both the consumer and enterprise level. The pretext changes to match the audience. The structure does not.

Consumer-Facing Examples

  • Fake delivery notifications: texts impersonating USPS, UPS, or FedEx claiming a package is held pending action, with a link to "confirm delivery" or pay a small redelivery fee.
  • Toll road and payment scams: texts claiming an outstanding road toll invoice requires immediate payment, using typosquatted toll authority domains.
  • Bank and account alerts: messages claiming suspicious activity on a financial account, with a link to "verify" credentials.
  • "Hi Mom/Hi Dad" family emergency scams: texts claiming the sender dropped their phone and is messaging from a new number, building rapport before requesting money. This format relies on emotional urgency rather than a URL.

Each follows the same structure: a plausible pretext, a fabricated urgency, and a call to action the victim would not question from a legitimate sender.

Enterprise and Workforce Examples

  • Fake MFA prompts and SSO requests: AiTM (Adversary-in-the-Middle) campaigns capture both credentials and MFA codes in real time, along with session cookies, by relaying them to the legitimate service before the victim notices anything is wrong.
  • IT help desk impersonation: actors pose as IT staff to convince employees to share one-time passwords and credentials, a pattern documented in a CISA advisory on threat actors targeting help desks.
  • CEO and executive impersonation: texts from a spoofed executive number asking an employee to purchase gift cards or handle an urgent financial request. These messages often contain no link and no malware, relying entirely on authority and urgency.

Enterprise smishing increasingly extends into collaboration and messaging platforms employees use daily. Phishing campaigns have been documented targeting commercial messaging applications including Signal and Microsoft Teams, with attackers impersonating IT help desks to trick employees into downloading malware or surrendering credentials through fake support workflows.

How to Recognize and Respond to Smishing

Smishing has consistent signals if a recipient slows down. The right response is to disengage from the message and verify through a trusted channel.

Message Red Flags

Several behavioral signals appear across most smishing attempts. Watch for unexpected requests for MFA codes, passwords, or quick action, especially when the sender claims to be IT, HR, or an executive. Shortened URLs, lookalike domains with slight misspellings, or bare URLs that bypass the brand's official app are common delivery mechanisms. 

Sender numbers that do not match the organization's documented contact directory, urgency language pushing fast reactions, and requests to install software or approve push notifications you did not initiate are also all consistent patterns.

Attackers increasingly use AI tools to produce more convincing SMS lures, which means linguistic quality is no longer a reliable red flag. Training should emphasize behavioral signals (unexpected requests, unverified senders, urgency without context) rather than grammar or spelling.

Safer Response Behaviors

  • Do not click links or call numbers from unexpected security or account texts. Navigate directly to the brand's official app or a bookmarked URL.
  • Do not reply with codes, passwords, or personal details. No legitimate IT, HR, or finance representative will request an MFA code via SMS.
  • Contact the organization through a trusted channel: the number on the back of a payment card, the official app, the IT help desk ticket system.
  • If you clicked a link or entered credentials, report it immediately. The time between credential entry and session revocation is the window the attacker uses.
  • The faster a suspicious message gets reported, the more of the response window the security team retains.

Smishing as Part of Multi-Channel Attacks

Smishing rarely operates alone. The most damaging campaigns combine SMS with email, voice calls, messaging apps, or fake support websites to build credibility across channels.

Multi-Channel Social Engineering Campaigns

Public reporting on Scattered Spider describes a pattern of smishing messages linking to fake credential-harvesting portals, followed by voice-based social engineering to obtain one-time passwords, combined with push bombing to coerce MFA approval, and in some cases SIM swapping to intercept SMS OTPs entirely. The victim's defenses are often designed for single-channel messages. The campaign is designed to defeat that.

MFA Fatigue and One-Time Code Theft

SMS is increasingly used to harvest one-time passcodes or push victims toward approving fraudulent push prompts. AiTM phishing kits relay credentials and MFA codes to the legitimate service in real time, capturing session tokens that can persist beyond the initial login. The attacker's goal is the session token, the OAuth grant, or the SSO cookie that the message helps them obtain.

Defending against the message alone is not enough. The investigation has to extend into the systems the attacker is actually trying to reach.

How Organizations Defend Against Smishing

Defense is a stack of policy, process, people, and technical controls. None of them alone is sufficient.

Policy and Process Defenses

The most important policy control is a written "never share" rule for MFA codes, OTPs, and passwords, reinforced in onboarding and annual training, stating explicitly that no legitimate representative will ever request these via SMS. Alongside that, organizations should publish a documented contact directory for IT, HR, and finance on an intranet-hosted page so employees can verify any inbound request through a trusted channel.

High-risk actions require dedicated verification steps. Password resets, MFA device enrollment changes, and wire transfers should require out-of-band identity verification that cannot be satisfied by an SMS alone. Organizations should also provide a low-friction reporting path, whether a dedicated SMS forwarding number or a simple internal URL, so employees can report suspicious texts from their mobile devices without friction. Finally, document the incident response chain from report through triage, credential reset, MFA revocation, session invalidation, and forensic review before an incident occurs.

Technical Controls

On the authentication side, replace SMS-based MFA with phishing-resistant alternatives. CISA guidance recommends FIDO/WebAuthn or PKI-based approaches, and Microsoft guidance prioritizes phishing-resistant or passwordless methods over SMS and email one-time codes, especially for privileged accounts. Pair that with conditional access policies requiring phishing-resistant MFA strength for administrator roles, blocking legacy authentication protocols, and requiring device compliance for mobile access.

MDM and MAM controls manage device compliance. Mobile threat defense tools provide detection and alerting for mobile phishing, including SMS-delivered threats, and are most effective when integrated with MDM. Carrier-level SMS filtering can reduce message volume on corporate device plans, but should be treated as a volume-reduction measure rather than a complete defense. 

Configure alerting for anomalous MFA enrollment events, new device registrations, and MFA method changes, and enable session monitoring with continuous access evaluation so active sessions can be revoked when smishing or AiTM activity is detected.

What to Do After a Smishing Incident or Near Miss

When a smishing attempt succeeds or nearly succeeds, the response runs across three phases, containing the damage, investigating what the attacker accessed, and closing the gaps that let it happen.

Immediate Response

Start with credential containment. Reset credentials for any account the victim entered information into, and any account that shares that credential. Revoke active sessions and tokens explicitly, including SSO sessions, OAuth grants, and refresh tokens, OAuth grants can persist beyond a password reset, so they require separate revocation. Check for unauthorized changes including MFA device additions, OAuth app consent grants, email forwarding rules, and new device registrations before moving to investigation.

Investigation

Query identity provider logs for authentication events from unfamiliar IPs, new device registrations, or impossible travel in the window following the reported message. Trace SSO-connected SaaS application access using the compromised account's session window as the time boundary. 

Audit cloud control plane activity for new IAM roles, API keys, or storage download events. Pay particular attention to federated domain and SAML configuration: attackers who gain access through identity compromise often manipulate federated domains and forge SAML tokens to establish persistence that survives credential resets.

Follow-Up

Update training with the actual smishing example so the team sees what landed in their environment. Refine policies if the incident exposed a gap in verification or contact-channel rules. Tune detections to catch similar patterns: unusual logins after a reported smishing message, OAuth grants from new locations, MFA device additions outside expected windows.

Where Smishing Investigation Sits in Modern SecOps

Smishing will remain a preferred delivery channel because SMS sits outside most security stacks and inside many people's trust assumptions. Policy and phishing-resistant MFA reduce risk, but they do not prevent compromise.

When a credential is entered, an MFA code is shared, or a session token is captured, the problem is no longer the message. The work shifts to identity providers, cloud control planes, and SaaS systems, where the question becomes what access the attacker gained and what they did with it.

At that point, the investigation is the same regardless of the initial delivery channel. The difference is whether the organization can correlate signals across those systems and reach a clear verdict without placing the burden back on the internal team.

For more on how that investigation works in practice, see how AI is changing phishing detection.

Frequently Asked Questions About Smishing

How Is Smishing Different from Regular Phishing in Terms of Organizational Risk?

The risk is not that smishing is more sophisticated than email phishing. The risk is that most organizations have mature defenses for email and immature defenses for SMS, while both channels can lead to the same downstream compromise: credential theft, account takeover, and lateral movement through identity infrastructure. Email security gateways, URL rewriting, and authentication protocols like DMARC provide zero coverage for SMS.

Can Smishing Bypass MFA?

Yes. AiTM phishing kits like Tycoon2FA relay both credentials and time-based OTP codes to the legitimate service in real time, capturing session tokens. MFA fatigue attacks repeatedly send push notifications until the user approves one. SIM swap attacks transfer the victim's phone number to an attacker-controlled SIM, routing all subsequent SMS OTPs to the attacker. CISA guidance recommends phishing-resistant MFA such as FIDO/WebAuthn or PKI-based approaches as the reliable mitigation.

Should Organizations Run Smishing Simulations Separately from Email Phishing Simulations?

The data supports it. The Verizon Mobile Security Index reported that among the 80% of organizations that conducted employee smishing tests, 39% found that up to half their employees clicked on a malicious link. CISA lists the Lookout SMS Phishing Assessment as a no-cost service specifically for SMS simulation, separate from email phishing tools.

What Should an Organization Prioritize First if It Currently Uses SMS for MFA?

Migrate privileged and administrator accounts to phishing-resistant MFA (FIDO2/WebAuthn or hardware security keys) first. This reflects the risk calculus: a compromised administrator account enables far more downstream damage. For the general workforce, app-based authenticators are a practical intermediate step while phishing-resistant MFA rollout scales.

What Log Sources Matter Most When Investigating a Suspected Smishing-Related Account Takeover?

Identity provider logs are the starting point. Okta System Log or Entra Sign-in Logs surface authentication events from unfamiliar IPs, new device registrations, and MFA method changes. Cloud provider audit logs (AWS CloudTrail, Azure Activity Log, GCP Cloud Audit Logs) surface IAM role creation, API key generation, and storage access events. OAuth consent grant logs and federated domain configuration should be audited explicitly, as both can create persistence that survives a basic credential reset.

Table of contents
form submission image form submission image

Ready to escape the dark and elevate your security?

button decoration
Get a demo
moutain illustration