Developing Threats: Mobile Phishing

The past decade has seen massive advancements in technology that have lead to augmenting our hyperconnectivity, larger storage systems that can be accessed from anywhere in the world, and other massive benefits. With these improvements, however, also came the bigger, more powerful, and more prevalent risks of falling victim to various forms of cybercrime such as mobile phishing.

In the past ten years alone, malware, man-in-the-middle attacks, and data leaks have risen to become the most widespread and concerning threats for individuals and organizations that have used mobile devices as part of their daily lives and activities. Cybercriminals do not discriminate victims, though the more powerful or more important their vulnerable target is, the better it is for them. After all, stolen data, compromised online accounts, custom malware, attack services and infrastructure, fraudulent vouchers, and many more are quite the moneymakers in the underground black market, and cybercriminals know and take full advantage of this.

Developing Threats: Mobile Phishing

While malware, man-in-the-middle attacks, and data leaks are recognized as the most common yet most dangerous threats to mobile users nowadays, a rising threat looms in the shadows: mobile phishing.

What is Mobile Phishing?

Basically, mobile phishing is an attack predicated on social engineering, a type of phishing that targets mobile device users of an enterprise using a well-known and well-understood method of their choosing. The most common phenomenon of this is the use of a mechanism to help them retrieve important information such as personal or financial records, whether it is through email, text message, social posts, or other similar methods. They will pose as legitimate websites or senders, often preying on the victim’s lack of knowledge, leveraging on panic, or even promising offers that seem legitimate when not thoroughly scrutinized.

For example, you may get an email from your bank claiming that, as part of their system upgrade, you are asked to update your details in their online server, especially if you’ve done online banking before. The email will appear exactly like the normal email of your bank, and will direct you to a website mirroring the bank’s own. Many have fallen prey to this kind of phishing, with the only indicator sometimes that something is wrong is the different email address and website URL. Many have not realized these small differences over the heap of signs that convince them that what they got was a legitimate message until they notice the discrepancies in their bank account.

Organizations, companies, and enterprises cannot make the mistake of compromising their data security, even through a remote device such as mobile phones. With so many people nowadays integrating their phones to their everyday work tasks, mobile phishing can cripple a company substantially if they manage to succeed in their goal of duping an employee into giving them access to the company’s confidential files.

Mobile Phishing Infographic

It is imperative, then, that you can protect your business and your employees from mobile phishing threats from here on out. Learn more about this quiet but deadly threat in detail and what you do about it with this infographic by TeleMessage.
Infographic: Developing Threats in Mobile Phishing

Author Bio

Developing Threats Mobile Phishing - Pinchas LevinsonThis article on mobile phishing as a developing threat was contributed by Pinchas Levinson. Pinchas, TeleMessage Digital Marketing Manager, is a seasoned professional in the fields of secure and mass messaging and text message archiving. With over 20 years experience supporting software and hardware development environments, his deep and broad technical background ensures high value to his educated commentary on industry developments. You can keep up with Pinchas on Twitter, Facebook, LinkedIn, & Google+.