Users really do respond to smishing

12/26/2022
by   Muhammad Lutfor Rahman, et al.
0

Text phish messages, referred to as Smishing is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the provided number. Thousands of mobile users are affected by smishing attacks daily. Drawing inspiration by the works of Tu et al. (USENIX Security, 2019) on Robocalls and Tischer et al. (IEEE Symposium on Security and Privacy, 2016) on USB drives, this paper investigates why smishing works. Accordingly, we designed smishing experiments and sent phishing SMSes to 265 users to measure the efficacy of smishing attacks. We sent eight fake text messages to participants and recorded their CLICK, REPLY, and CALL responses along with their feedback in a post-test survey. Our results reveal that 16.92 of our participants had potentially fallen for our smishing attack. To test repeat phishing, we subjected a set of randomly selected participants to a second round of smishing attacks with a different message than the one they received in the first round. As a result, we observed that 12.82 fell for the attack again. Using logistic regression, we observed that a combination of user REPLY and CLICK actions increased the odds that a user would respond to our smishing message when compared to CLICK. Additionally, we found a similar statistically significant increase when comparing Facebook and Walmart entity scenario to our IRS baseline.

READ FULL TEXT
research
02/03/2020

Private Summation in the Multi-Message Shuffle Model

The shuffle model of differential privacy (Erlingsson et al. SODA 2019; ...
research
06/14/2020

Cloud as an Attack Platform

We present an exploratory study of responses from 75 security profession...
research
11/14/2022

User Perception and Actions Through Risk Analysis Concerning Cookies

A website browser cookie is a small file created by a web server upon vi...
research
05/16/2023

Poster: No safety in numbers: traffic analysis of sealed-sender groups in Signal

Secure messaging applications often offer privacy to users by protecting...
research
06/09/2021

AdaptOver : Adaptive Overshadowing of LTE signals

We introduce AdaptOver, a new LTE signal overshadowing attack that allow...
research
09/12/2023

Preliminary Results from a U.S. Demographic Analysis of SMiSh Susceptibility

As adoption of mobile phones has skyrocketed, so have scams involving th...
research
06/24/2020

Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

Cyber attacks such as phishing, IRS scams, etc., still are successful in...

Please sign up or login with your details

Forgot password? Click here to reset