Unexplained Surge In Robotext Scams

The US Federal Communications Commission (FCC) has reported increases in complaints due to scam robotexts and it says that Americans received more spam texts in 2021 than ever before. 

Robotext scams are rapidly increasing and could be more than robocalls as a current method of fraud. These are automated Text messages used to mask the originating number and make it appear that the text is coming from a number the recipient is likely to trust. 

Scammers use these methods to get you to respond to a text and the criminals may opt for a local number, or impersonate a government agency, such as the IRS, or a company you’re familiar with. Many of the scam texts contain messages regarding fake unpaid bills, bank account issues, and package deliveries. In addition, some of the scams pretend to be texting someone else.

The FCC tracks consumer complaints, and found that the number of complaints have risen from 5700 in 2019 to 15,300 in 2021. The FCC says that the amount of scam texts from robocall and robotext blocking services are increasing alongside the scam texts. Texas is a hotspot where users received over 10 billion fake messages. 

According to the anti-spam platform RoboKiller, Americans got 12.02 billion scam texts in June alone. The volume of spam texts rose 58% to 87.85 billion last year.

In June 2021, the FCC mandated the use of an anti-spoofing technology called the Secure Telephone Identity Revisited (STIR) protocol, and its implementation framework, Signature-based Handling of Asserted Information using toKENs (SHAKEN).  These anti-spoofing technologies are intended to stop scammers by applying digital signatures to telephone numbers from calling parties on Session Initiation Protocol (SIP) networks, although this technology only works with voice calls, not text messages.

Text-based scammers are typically trying to gain personal information about the recipient that can be exploited for financial gain - payment card numbers, proof of identity and other personal details. 

The FCC previously mandated the use of anti-spoofing technology to stop scammers by applying digital signatures to telephone numbers. This means that targets often receive phone calls that state “scam risk” and are therefore more aware of the nature of that call. The technology only applies to voice calls, not text messages. 

The FCC has  warned people to avoid responding to suspicious texts or clicking on any links they might contain. They can forward unwanted texts to SPAM (7726). "Scam text message senders want you to engage with them...  a robotexter may use fear and anxiety to get you to interact... Texts may include false-but-believable claims about unpaid bills, package delivery snafus, bank account problems, or law enforcement actions against you. They may provide confusing information, as if they were texting someone else, incomplete information, or utilise other techniques to spur your curiosity and engagement." the FCC has said.

Some scammers are usually after your money, others may simply be trying to collect personal information or confirm that a number is active for use in future scams.

The FFC advice is not to respond or click on any links in the message. If you think a text might be legitimate, you are advised to look up contact information separately and contact the company, government agency, or law enforcement directly.

FCC:     Robokiller:     Secureworld:    Unified Guru:    Oodalop:      Infosecurity Magazine:    TEISS:   

You Might Also Read: 

Two Million Extortion Emails Blocked Every Day:

 

« Dealing With Cyber Security Threats Is Hard Work
Update: British NHS Confirms A Damaging Software Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.