Text phish messages, referred to as Smishing is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the provided number. Thousands of mobile users are affected by smishing attacks daily. Drawing inspiration by the works of Tu et al. (USENIX Security, 2019) on Robocalls and Tischer et al. (IEEE Symposium on Security and Privacy, 2016) on USB drives, this paper investigates why smishing works. Accordingly, we designed smishing experiments and sent phishing SMSes to 265 users to measure the efficacy of smishing attacks. We sent eight fake text messages to participants and recorded their CLICK, REPLY, and CALL responses along with their feedback in a post-test survey. Our results reveal that 16.92% of our participants had potentially fallen for our smishing attack. To test repeat phishing, we subjected a set of randomly selected participants to a second round of smishing attacks with a different message than the one they received in the first round. As a result, we observed that 12.82% potentially fell for the attack again. Using logistic regression, we observed that a combination of user REPLY and CLICK actions increased the odds that a user would respond to our smishing message when compared to CLICK. Additionally, we found a similar statistically significant increase when comparing Facebook and Walmart entity scenario to our IRS baseline.
翻译:文字文字文字信息, 称为 Smishing, 是社会工程攻击的一种类型, 它创造了假文字信息, 并用来引诱用户回应这些信息。 这些信息旨在获取用户证书, 在手机上安装恶意软件, 或启动嘲笑攻击 。 他们要求用户回复其信息, 点击一个将信息改到phish网站的URL, 或拨打提供的数字。 数千个移动用户每天受到嘲笑袭击的影响 。 在 Tu et al. ( USENIX Security, 2019) 的作品中, 在 Robocalls 和 Tischer 等( 2016年关于安全和隐私的 IEEEE 研讨会) 上, 吸引用户响应这些信息。 这些文件的目的是要获取用户证书证书证书, 或在用户们看到我们第二次访问时, 我们第一次将滚动的滚动数据信息比我们所选择的滚动的快速数据要低一个。 我们的参与者在进行一次重现时, 一次重现了我们所选择的快速攻击的结果。