Unexplained Surge In Robotext Scams

The US Federal Communications Commission (FCC) has reported increases in complaints due to scam robotexts and it says that Americans received more spam texts in 2021 than ever before. 

Robotext scams are rapidly increasing and could be more than robocalls as a current method of fraud. These are automated Text messages used to mask the originating number and make it appear that the text is coming from a number the recipient is likely to trust. 

Scammers use these methods to get you to respond to a text and the criminals may opt for a local number, or impersonate a government agency, such as the IRS, or a company you’re familiar with. Many of the scam texts contain messages regarding fake unpaid bills, bank account issues, and package deliveries. In addition, some of the scams pretend to be texting someone else.

The FCC tracks consumer complaints, and found that the number of complaints have risen from 5700 in 2019 to 15,300 in 2021. The FCC says that the amount of scam texts from robocall and robotext blocking services are increasing alongside the scam texts. Texas is a hotspot where users received over 10 billion fake messages. 

According to the anti-spam platform RoboKiller, Americans got 12.02 billion scam texts in June alone. The volume of spam texts rose 58% to 87.85 billion last year.

In June 2021, the FCC mandated the use of an anti-spoofing technology called the Secure Telephone Identity Revisited (STIR) protocol, and its implementation framework, Signature-based Handling of Asserted Information using toKENs (SHAKEN).  These anti-spoofing technologies are intended to stop scammers by applying digital signatures to telephone numbers from calling parties on Session Initiation Protocol (SIP) networks, although this technology only works with voice calls, not text messages.

Text-based scammers are typically trying to gain personal information about the recipient that can be exploited for financial gain - payment card numbers, proof of identity and other personal details. 

The FCC previously mandated the use of anti-spoofing technology to stop scammers by applying digital signatures to telephone numbers. This means that targets often receive phone calls that state “scam risk” and are therefore more aware of the nature of that call. The technology only applies to voice calls, not text messages. 

The FCC has  warned people to avoid responding to suspicious texts or clicking on any links they might contain. They can forward unwanted texts to SPAM (7726). "Scam text message senders want you to engage with them...  a robotexter may use fear and anxiety to get you to interact... Texts may include false-but-believable claims about unpaid bills, package delivery snafus, bank account problems, or law enforcement actions against you. They may provide confusing information, as if they were texting someone else, incomplete information, or utilise other techniques to spur your curiosity and engagement." the FCC has said.

Some scammers are usually after your money, others may simply be trying to collect personal information or confirm that a number is active for use in future scams.

The FFC advice is not to respond or click on any links in the message. If you think a text might be legitimate, you are advised to look up contact information separately and contact the company, government agency, or law enforcement directly.

FCC:     Robokiller:     Secureworld:    Unified Guru:    Oodalop:      Infosecurity Magazine:    TEISS:   

You Might Also Read: 

Two Million Extortion Emails Blocked Every Day:

 

« Dealing With Cyber Security Threats Is Hard Work
Update: British NHS Confirms A Damaging Software Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.