Skip to main content
    BeginnerLes 2 van 9·Phishing & social-engineering e-mail

    Smishing in 2026 — SMS Phishing Attacks and How to Stop Them

    Smishing is phishing delivered by SMS or mobile messaging. In 2026 the four dominant pretexts are package-delivery scams, bank-fraud alerts, tax-refund or fine notices, and corporate IT-helpdesk lures. SMS bypasses the email security stack entirely and arrives on a device employees trust more than their laptop.

    Reviewed by the HackersHub team — updated 13 May 20267 min readVrij te gebruiken — CC-BY-ND 4.0

    Het scenario

    A senior engineer at a Dutch fintech receives an SMS on a Thursday at 17:48: 'PostNL: your package could not be delivered — €1.45 customs fee outstanding. Pay now to release: postnl-secure-betalen.com/track/8842'. The engineer is expecting a delivery, the message references a plausible amount, and the domain looks officially PostNL-shaped. She taps the link from her phone — the rendered page is pixel-identical to the real PostNL payment flow, complete with iDEAL bank selector. She picks her bank, lands on what appears to be the iDEAL gateway, and enters her credentials and the SMS-OTP. The site then says 'verification failed, please try again'. She enters credentials a second time. While she is doing this, an attacker on the other end is logged into her actual bank, registering a new device with the OTPs she just relayed. By 18:11 the attacker has moved €18,400 from her current account into a money-mule chain. The lesson: the smish worked not because the engineer was careless, but because the attacker mapped the exact moment a real package was expected and matched the brand experience with pixel fidelity.

    Hoe de aanval werkt

    Smishing relies on three structural advantages over email phishing: there is no rich URL preview on most phones so users tap before reading, mobile users trust SMS more than email because it is rarer, and corporate security stacks do not see SMS at all. The kits the attackers use are off-the-shelf — modular phishing-as-a-service platforms with brand templates for every major bank, courier, tax authority, telco and government agency in each target country. The sender numbers are spoofed or rented from grey-market SMS gateways, sometimes via SS7 routing. The most damaging 2026 variant chains smishing with a follow-up call: SMS gets the credentials and the SMS-OTP, then the attacker calls the victim from a spoofed bank fraud-team number to talk them through 'verifying' the second OTP. Corporate variants — Twilio-style — target IT or developer staff at a specific employer with an MFA-fatigue pretext ('your VPN expires in 5 minutes, tap here to refresh'). MITRE ATT&CK techniques: T1566.003 (Spearphishing via Service), T1078.001 (Valid Accounts: Default Accounts) when chained with credential reuse, T1411 (Input Capture — mobile). The single most effective user-side defence is a hard 'never tap a link in an unsolicited SMS' habit, regardless of how legitimate the message looks.

    Waar je op moet letten

    • Any link inside an SMS, especially with a shortened domain, lookalike domain, or unusual TLD (.zip, .cam, .top, country-specific lookalikes)
    • Pressure to act immediately — 'your account will be closed in 24 hours', 'package will be returned to sender', 'fine doubles after midnight'
    • Generic salutation or no name at all — legitimate organisations who have your number usually have your name
    • A request for credentials, payment, or 2FA codes via a link rather than via the organisation's app
    • Senders showing as a phone number when the organisation normally uses a branded short-code or alpha-sender
    • Unsolicited two-factor SMS codes that you did not request — somebody is trying to log in as you
    • A follow-up phone call from the same 'organisation' shortly after the SMS, often from a spoofed official number
    • Workplace-themed SMS impersonating IT helpdesk, HR, or a senior executive asking for action via a link

    Wat te doen

    1. Never tap links in unsolicited SMS — open the official app or type the URL manuallyEvery legitimate notification a bank, courier or tax authority sends can be confirmed inside their app or by typing the URL yourself.
    2. Never reply, even with 'STOP' — replying confirms an active number to the attackerCarriers do support genuine STOP for marketing SMS, but for clear scams, do not engage. Report instead.
    3. Forward smishing SMS to the national reporting numberNL: forward to 7726 (works on most carriers). UK: 7726. US: 7726. This routes the message to the carrier and national fraud teams for blocklisting.
    4. Report to NCSC-NL fraudehelpdesk.nl (NL) or the equivalent national fraud authorityA 30-second form report contributes to the national pattern dataset that gets specific scams blocked at carrier level.
    5. Lock your bank account immediately if you entered any credentialsMost banks support an in-app emergency lock. Then call the fraud line on the number printed on the back of your bank card — not a number from the message.
    6. Warn family and colleagues without forwarding the originalDescribe the scam pattern; never forward the raw smish — that re-spreads the attacker's link.
    7. If a corporate-themed smish targeted you, escalate to security even if you did not clickTargeted smishing of an employee implies the attacker has the employee roster — security needs that signal.

    Verdediging — voor IT en beleid

    Technische controles

    • Mobile Device Management (MDM) profiles that route corporate traffic through a security gateway with SMS-link inspection — Lookout, Zimperium, or equivalent
    • Phishing-resistant MFA (FIDO2/passkeys) for all employee logins, which defeats the SMS-OTP-relay variant entirely
    • Carrier-level SMS firewalls (telcos increasingly offer enterprise SMS-firewall products that block known smishing infrastructure)
    • Internal alpha-sender registration for the company's own SMS comms so employees can be trained to expect specific sender names
    • Mobile threat-defence agent on managed phones with real-time link scanning and brand-spoof detection

    Beleidscontroles

    • Written policy: corporate IT will NEVER send a credential-action link via SMS. Employees report any such message as a smish without exception.
    • Written policy: HR and Finance will NEVER request action via SMS — only via internal portals or in-person/video confirmation.
    • Documented reporting flow that includes both the national fraud channel and the internal security team
    • Regular reminders during pay cycles, tax season, holiday delivery peaks — the seasonal smishing waves that exploit specific calendar moments

    Trainingsfrequentie

    Pair this module with a quarterly mobile-themed simulation that includes at least one SMS lure and one chained SMS-then-call lure. Track reporting rate per quarter; in mature programs reporting rate climbs above 50% within four cycles. End-user click rates on SMS are higher than email — accept this and lean on phishing-resistant MFA and process controls.

    Korte check

    Vijf vragen. Antwoorden en toelichting verschijnen na inzenden.

    1. Q1.

      You receive an SMS from 'your bank' warning of fraud on your account, with a link to verify. The link domain ends in .top. What is the safest action?

    2. Q2.

      Why does smishing bypass corporate security so effectively?

    3. Q3.

      Which authentication method best defends against the SMS-OTP-relay attack chain?

    4. Q4.

      You receive an unsolicited 2FA SMS code you did not request. What is the most likely cause?

    5. Q5.

      What is the correct first response to a corporate-themed smish (e.g. fake IT helpdesk SMS asking to refresh your VPN)?

    Bronnen & verdere lectuur

    Verwante modules

    Wil je een echte aanvaller in je omgeving testen?

    HackersHub voert betaalde red-team-engagements uit.

    Praat met een expert

    Deze module is door HackersHub goedgekeurd in exact deze vorm, inclusief watermerk. Gratis onder CC-BY-ND 4.0. Wil je de inhoud aanpassen? Verwijder dan eerst ons watermerk. — Het HackersHub-team Bekijk licentievoorwaarden.