Unexplained Surge In Robotext Scams

The US Federal Communications Commission (FCC) has reported increases in complaints due to scam robotexts and it says that Americans received more spam texts in 2021 than ever before. 

Robotext scams are rapidly increasing and could be more than robocalls as a current method of fraud. These are automated Text messages used to mask the originating number and make it appear that the text is coming from a number the recipient is likely to trust. 

Scammers use these methods to get you to respond to a text and the criminals may opt for a local number, or impersonate a government agency, such as the IRS, or a company you’re familiar with. Many of the scam texts contain messages regarding fake unpaid bills, bank account issues, and package deliveries. In addition, some of the scams pretend to be texting someone else.

The FCC tracks consumer complaints, and found that the number of complaints have risen from 5700 in 2019 to 15,300 in 2021. The FCC says that the amount of scam texts from robocall and robotext blocking services are increasing alongside the scam texts. Texas is a hotspot where users received over 10 billion fake messages. 

According to the anti-spam platform RoboKiller, Americans got 12.02 billion scam texts in June alone. The volume of spam texts rose 58% to 87.85 billion last year.

In June 2021, the FCC mandated the use of an anti-spoofing technology called the Secure Telephone Identity Revisited (STIR) protocol, and its implementation framework, Signature-based Handling of Asserted Information using toKENs (SHAKEN).  These anti-spoofing technologies are intended to stop scammers by applying digital signatures to telephone numbers from calling parties on Session Initiation Protocol (SIP) networks, although this technology only works with voice calls, not text messages.

Text-based scammers are typically trying to gain personal information about the recipient that can be exploited for financial gain - payment card numbers, proof of identity and other personal details. 

The FCC previously mandated the use of anti-spoofing technology to stop scammers by applying digital signatures to telephone numbers. This means that targets often receive phone calls that state “scam risk” and are therefore more aware of the nature of that call. The technology only applies to voice calls, not text messages. 

The FCC has  warned people to avoid responding to suspicious texts or clicking on any links they might contain. They can forward unwanted texts to SPAM (7726). "Scam text message senders want you to engage with them...  a robotexter may use fear and anxiety to get you to interact... Texts may include false-but-believable claims about unpaid bills, package delivery snafus, bank account problems, or law enforcement actions against you. They may provide confusing information, as if they were texting someone else, incomplete information, or utilise other techniques to spur your curiosity and engagement." the FCC has said.

Some scammers are usually after your money, others may simply be trying to collect personal information or confirm that a number is active for use in future scams.

The FFC advice is not to respond or click on any links in the message. If you think a text might be legitimate, you are advised to look up contact information separately and contact the company, government agency, or law enforcement directly.

FCC:     Robokiller:     Secureworld:    Unified Guru:    Oodalop:      Infosecurity Magazine:    TEISS:   

You Might Also Read: 

Two Million Extortion Emails Blocked Every Day:

 

« Dealing With Cyber Security Threats Is Hard Work
Update: British NHS Confirms A Damaging Software Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

European Cybersecurity Competence Centre (ECCC)

European Cybersecurity Competence Centre (ECCC)

The ECCC aims to increase Europe’s cybersecurity capacities and competitiveness, working together with a Network of National Coordination Centres to build a strong cybersecurity Community.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.