Messaging Threat Intelligence
Examples of phishing and social engineering campaigns targeting employees through messaging platforms.
Attackers increasingly use SMS, WhatsApp, and workplace messaging tools to bypass traditional security controls. SmishAlert helps organizations surface these threats through workforce reporting and campaign correlation. The patterns below are informed by tens of thousands of real-world analyzed messages.
Recent Campaigns
Campaign patterns observed in real-world messaging attacks. SmishAlert correlates similar reports across organizations to identify these threat types.
Fake Microsoft MFA Reset
Observed PatternChannel: SMS
Target: Employees in finance departments
Attackers send SMS messages impersonating IT administrators and directing employees to fake Microsoft login pages.
CEO Gift Card Impersonation
Observed PatternChannel: SMS and WhatsApp
Attackers impersonate company executives and request gift cards from employees.
Payroll Change Scam
Observed PatternChannel: SMS
Attackers impersonate HR or payroll administrators requesting changes to direct deposit information.
Common Messaging Attack Patterns
- Executive impersonation scams
- Credential harvesting links
- Payroll fraud requests
- Vendor payment scams
- Fake IT support messages
Messaging Channels Used in Attacks
These channels often operate outside traditional security monitoring systems.
SMS
Slack
Microsoft Teams
iMessage
Enterprise Q&A: Phishing and Smishing Answers
Explore structured answers to high-intent questions on phishing, smishing, SMS security, messaging threats, and social engineering response.
Monitor Messaging Threats Targeting Your Workforce
Surface phishing and social engineering campaigns through workforce reporting and campaign correlation.