Messaging Threat Intelligence

Examples of phishing and social engineering campaigns targeting employees through messaging platforms.

Attackers increasingly use SMS, WhatsApp, and workplace messaging tools to bypass traditional security controls. SmishAlert helps organizations surface these threats through workforce reporting and campaign correlation. The patterns below are informed by tens of thousands of real-world analyzed messages.

Recent Campaigns

Campaign patterns observed in real-world messaging attacks. SmishAlert correlates similar reports across organizations to identify these threat types.

Fake Microsoft MFA Reset

Observed Pattern

Channel: SMS

Target: Employees in finance departments

Attackers send SMS messages impersonating IT administrators and directing employees to fake Microsoft login pages.

CEO Gift Card Impersonation

Observed Pattern

Channel: SMS and WhatsApp

Attackers impersonate company executives and request gift cards from employees.

Payroll Change Scam

Observed Pattern

Channel: SMS

Attackers impersonate HR or payroll administrators requesting changes to direct deposit information.

Common Messaging Attack Patterns

  • Executive impersonation scams
  • Credential harvesting links
  • Payroll fraud requests
  • Vendor payment scams
  • Fake IT support messages

Messaging Channels Used in Attacks

These channels often operate outside traditional security monitoring systems.

S

SMS

W

WhatsApp

S

Slack

M

Microsoft Teams

i

iMessage

Enterprise Q&A: Phishing and Smishing Answers

Explore structured answers to high-intent questions on phishing, smishing, SMS security, messaging threats, and social engineering response.

Monitor Messaging Threats Targeting Your Workforce

Surface phishing and social engineering campaigns through workforce reporting and campaign correlation.