Unexplained Surge In Robotext Scams

The US Federal Communications Commission (FCC) has reported increases in complaints due to scam robotexts and it says that Americans received more spam texts in 2021 than ever before. 

Robotext scams are rapidly increasing and could be more than robocalls as a current method of fraud. These are automated Text messages used to mask the originating number and make it appear that the text is coming from a number the recipient is likely to trust. 

Scammers use these methods to get you to respond to a text and the criminals may opt for a local number, or impersonate a government agency, such as the IRS, or a company you’re familiar with. Many of the scam texts contain messages regarding fake unpaid bills, bank account issues, and package deliveries. In addition, some of the scams pretend to be texting someone else.

The FCC tracks consumer complaints, and found that the number of complaints have risen from 5700 in 2019 to 15,300 in 2021. The FCC says that the amount of scam texts from robocall and robotext blocking services are increasing alongside the scam texts. Texas is a hotspot where users received over 10 billion fake messages. 

According to the anti-spam platform RoboKiller, Americans got 12.02 billion scam texts in June alone. The volume of spam texts rose 58% to 87.85 billion last year.

In June 2021, the FCC mandated the use of an anti-spoofing technology called the Secure Telephone Identity Revisited (STIR) protocol, and its implementation framework, Signature-based Handling of Asserted Information using toKENs (SHAKEN).  These anti-spoofing technologies are intended to stop scammers by applying digital signatures to telephone numbers from calling parties on Session Initiation Protocol (SIP) networks, although this technology only works with voice calls, not text messages.

Text-based scammers are typically trying to gain personal information about the recipient that can be exploited for financial gain - payment card numbers, proof of identity and other personal details. 

The FCC previously mandated the use of anti-spoofing technology to stop scammers by applying digital signatures to telephone numbers. This means that targets often receive phone calls that state “scam risk” and are therefore more aware of the nature of that call. The technology only applies to voice calls, not text messages. 

The FCC has  warned people to avoid responding to suspicious texts or clicking on any links they might contain. They can forward unwanted texts to SPAM (7726). "Scam text message senders want you to engage with them...  a robotexter may use fear and anxiety to get you to interact... Texts may include false-but-believable claims about unpaid bills, package delivery snafus, bank account problems, or law enforcement actions against you. They may provide confusing information, as if they were texting someone else, incomplete information, or utilise other techniques to spur your curiosity and engagement." the FCC has said.

Some scammers are usually after your money, others may simply be trying to collect personal information or confirm that a number is active for use in future scams.

The FFC advice is not to respond or click on any links in the message. If you think a text might be legitimate, you are advised to look up contact information separately and contact the company, government agency, or law enforcement directly.

FCC:     Robokiller:     Secureworld:    Unified Guru:    Oodalop:      Infosecurity Magazine:    TEISS:   

You Might Also Read: 

Two Million Extortion Emails Blocked Every Day:

 

« Dealing With Cyber Security Threats Is Hard Work
Update: British NHS Confirms A Damaging Software Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Euro-Recycling

Euro-Recycling

Euro-Recycling is a leading UK provider of Secure On-Site Data Media Destruction Services.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.