What Infobip Gets Wrong About SMS Phishing (Smishing)
Paul Walsh
My purpose is to make the internet safer through a radically new, human-centric approach to security. Most leading tech & security companies license my patents for mobile app security. Patents pending for SMS security.
I've undertaken the task of unraveling the advice offered by SMS Firewall vendors, aiming to empower mobile operators and regulators in making better informed assessments regarding SMS Phishing. To begin this endeavor, I chose to focus on one of the major players in the field - Infobip. By examining their perspectives as presented on their website, I provide my own response to offer unique insights into the matter.
What Infobip thinks
What I think
I could improve this but I’ll leave it because it’s actually better than what some anti-phishing security vendors define phishing - ironically and very annoyingly.
What Infobip thinks
What I think
What Infobip thinks
What I think
What Infobip thinks
What I think
This is entirely incorrect. Smishing does not fall into a "grey area"; it is a clear-cut issue. Trademarks have no relevance to anti-phishing protection. Bringing up trademarks will only lead to confusion and divert people's attention away from the crucial aspects. It may mislead individuals into thinking they require "trademark protection.” All of this becomes obvious when you’ve studied it for long enough.
What Infobip thinks
What I think
The first paragraph is technically incorrect and needs to be corrected to prevent individuals from seeking the wrong type of solution, which may seem peculiar but is true. No individual in the world had their handset infected with Flubot simply by clicking a link within an SMS message. In reality, what happens is that people open the link contained in the SMS, which directs them to a deceptive webpage impersonating an entity. In the case of Flubot malware, victims had to willingly open the link, trust the presented webpage, download the fraudulent app, and subsequently modify their device permissions as instructed by the malicious app. Only then could the malware infect their device.
What Infobip says
领英推荐
What I think
I don't understand why "fake landing pages” are separated from malware attacks because, even in the case of Flubot, the malware required individuals to click on a link and visit a fake page where they were prompted to download a fraudulent app.
Fake landing pages serve purposes beyond stealing personal information. Most SMS phishing attacks involve a URL that directs victims to a fake or **legitimate** page.
?? It's important to note the mention of a legitimate page.
Infotip's website doesn't include any reference to "reverse-proxy" phishing attacks. The PKI Consortium (CA Security Council) invited me to write an article based on MetaCert's unique insights, skills, and experience in this field. I recommend reading that article for a detailed explanation. You can access it here.
Landing pages consistently employ one-off or very short-lived URLs, rendering them extremely difficult to detect—rather than "almost" impossible. This single chokepoint makes everything else irrelevant. If you cannot detect the URL, what hope do you have in protecting people? You certainly cannot rely solely on the sender ID or copycat text.
What Infobip thinks
What I think
I must admit that I didn't pay much attention to the section above, as the specific numbers or details of how they were obtained don't matter - it’s moot.
There's another section that attempts to explain the different types of smishing one might encounter in the wild. However, it falls short as it fails to even mention the targeted SMS phishing attacks that affected 150+ companies in 2022.
What Infobip thinks
What I think
When you click "SMS Firewall technology," you're taken to the Infobip product page that fails to mention anything about phishing and how they protect mobile subscribers from it. Their focus is solely on the detection of spam to safeguard operators.
Conclusion:
In reality, Infobip doesn't offer any form of anti-phishing protection to mobile subscribers. Furthermore, even ProoPoint, the owner of SMS Firewall vendor Cloudmark, doesn't offer a solution for smishing. Remarkably, no cybersecurity vendor worldwide currently offers any solution specifically tailored to mobile operators. Have you ever wondered why? The answer lies in the fact that security vendors are well aware of the deficiencies in email security, which would become apparent the moment they disclose the mobile network they claim to "protect." You can’t test the security posture of any organization's email because it’s behind corporate walls. SMS, on the other hand, is a public-facing channel that's accessible on every mobile device on the planet.
Here's the revised version of the text, incorporating the requested change:
Now, how can one determine whether an SMS Firewall vendor is capable of effectively stopping smishing?
That's all it takes.
Consider this...
If world-leading cybersecurity companies such as Microsoft, Okta, and Cisco can fall victim to SMS phishing attacks that skillfully impersonate their own text messages, URLs, and SSO login pages, it raises critical questions. How did these attacks succeed, given that these companies offer security solutions specifically designed to safeguard their customers against such attacks? Twilio owns an app-based 2FA solution called Authy. Twilio employees also fell for the targeted SMS Phishing attacks in 2022 - how can they claim to have robust anti-phishing protection for their customers?
These incidents highlight a significant challenge. If such renowned cybersecurity companies struggle to defend against SMS Phishing, how can SMS Firewall vendors expect to tackle the problem? Merely relying on email-like spam filters, which are not specifically designed or built to handle the complexities involved in an anti-phishing solution, does not suffice.
Programmable Telecoms / Communications Expert
1 年Phishing is principally about social engineering, a con, the channel is irrelevant. We receive SMS on laptops, and emails on mobiles. Phishing is about getting the con delivered to the target on whatever communications channel works. Phishing is a different category of problem to those tackled by SMS firewalls, e.g. stopping A2P SMS pretending to be P2P SMS (a significant component of SMS firewalls as it stops revenue leakage), as well as illegal SMS SPAM from inside and outside the network. Until the industry realizes the difference between phishing and spam, we're not going to see adequate solutions to protect customers.