Mobile Phishing Attacks

Suppose your business focuses its phishing protection efforts on email. In that case, it’s time to reevaluate your enterprise security protocols and turn your attention to mobile devices.

Hackers always target the easiest entry point, and most smartphones lack the defenses of PCs and laptops. Also, people tend to be less cautious on their phones, believing they aren’t vulnerable to threats. If your team uses mobile devices for work (and there’s a good chance of this since almost 75% of all employees do), you must take action to stop mobile phishing, or “mishing.” 

 

Mobile Phishing Attacks Exploit Perceived Legitimacy

Stopping mobile attacks is a hard task because hackers are adept at disguising attacks as genuine messages. While some messages are fake — coming from a bank you don’t do business with, for example — a message that is apparently from your boss is harder to ignore. Every victim of a phishing scheme reports receiving a message that looks like it came from a trusted source like a colleague, vendor, or client. 

When it comes to mobile phishing attacks, creating this perceived legitimacy is even easier. For starters, the smaller screens on mobile devices make it harder to spot many of the hallmarks of phishing scams, like discrepancies in the URL address bar or character substitutions in contact information (using B for 8 or 0 for O, for example.) Hackers also use "https://" for their malicious websites, further deceiving recipients about the site's legitimacy. 

However, what you need to worry about is phishing-as-a-service, hackers’ most sophisticated tool for launching mobile malware attacks. 

 

What Is Phishing-as-a-Service? 

For every successful phishing attack, thousands of infected messages never reach their intended victims, or eagle-eyed device owners immediately recognize the threat they pose and delete them. Robust mobile threat protection stops attacks before they start by blocking suspicious messages based on their content, keeping them out of inboxes.  

However, a phishing-as-a-service platform called Darcula allows criminals to send virtually undetectable phishing messages. Hackers can send harmful links using Rich Communication Services (RCS) rather than the Short Messaging System (SMS) used for texting. RCS encrypts messages from end to end so that phishing scams can slip through unnoticed. 

Ultimately, because threat detection tools cannot detect mobile phishing attacks sent via RCS based on their content, recipients believe they’re legitimate.

 

Address Mobile Threats to Your Business Now

Security researchers report that at least 25% of protected devices encountered mobile malware in the last year, with trojans and riskware comprising the majority of mobile threats. 

Although some risk comes from platform vulnerabilities, sideloading apps — installing applications from sources other than official app stores  — accounted for at least 80% of malware infections.

 

Protect Your Business from Threats

Now is the time to safeguard your business against mobile phishing attacks. A formidable security posture that includes mobile app vetting, threat defense, stronger network security policies, and ongoing awareness training will stop hackers.

 


 

Reference (Additional Information for You)

Infosecurity Magazine: 82% of Phishing Sites Now Target Mobile Devices

Metacompliance: How to Prevent Mobile Phishing Attacks

 


 

Please sign up for our newsletter above

 

By Denis Wilson

Cybersecurity Expert, Small Business Technology Consultant, Managed Services Provider, Managed IT Support

Thanks for reading this post. I always take into mind that your time and attention are precious. And these posts need to be timely, to the point, and short. For more tips on thriving with small business technology, check out the other blog posts at DWPIA Blogs. You can also find me on LinkedIn, YouTube, and Facebook

I am also a published author and speaker on cloud computing, remote-work, cybersecurity, and AI. I work extensively with business and professional associations to provide small business technology education programs.

Contact me if you have any questions about the subject. I'd be happy to spend 15 minutes discussing it with you.

 


 

  Telephone: 866-995-4488
  eMail: info@dwpia.com