Smishing, or SMS phishing, is a scam where criminals use text messages to trick people into clicking malicious links, sharing sensitive data, or sending money. It works because scam texts look like ordinary messages, such as delivery updates, bank alerts, or login codes. This article will cover the basics of smishing, including the most common types, warning signs to watch out for, and the best ways to keep yourself safe.
The broadest identity theft protection available
Get notified and act immediately
30-day money-back guarantee
View promotion details.
Smishing is a form of phishing that happens through SMS. A scammer sends a deceptive text message that looks important, routine, or believable and tries to get you to click a link, call a number, send money, or share personal or financial information. They want to get access to your Social Security number, passwords, credit card numbers, and bank account details.
The term “smishing” combines “SMS” (or “Short Message Service”), the technology behind standard text messages, and “phishing.”
A smishing attack works by making a fake text feel like a real one. The message usually appears to come from someone you know or a delivery service, bank, or government agency. It pushes you to act quickly and click a link, call a number, confirm account information, or address a supposed urgent problem.
These scams work because texts feel immediate and familiar. Scammers may spoof numbers, impersonate trusted brands, use personal details, or create urgency to make the smishing message seem real.
A typical smishing scam follows this pattern:
Smishing, phishing, and vishing are all social engineering scams. The main difference is the channel.
Phishing is the broad term for scams that trick people into giving up sensitive information or access. It often happens through email, fake websites, or online messages. Smishing is a type of phishing delivered by text.
Vishing is voice phishing. Instead of texting you, the scammer calls you (or asks you to call them) and uses pressure, scripts, and impersonation over the phone. More on that here: What is vishing?
Smishing and vishing often overlap. For example, a fake fraud-alert text may tell you to call “security support,” turning a text scam into a phone scam.
The table below highlights the main differences:
Smishing | Phishing | Vishing | |
Channels | SMS (Short Message Service) | Email, websites, online messages | Phone call or callback |
Goals | Steal data, money, or account access | Steal login credentials or install malware | Extract money, codes, or remote access |
Lures | Delivery issue, bank alert, toll, verification code | Password reset, invoice, document share, account warning | Bank fraud call, tech support, government threat |
Main risks | Credential theft, payment fraud, account takeover | Credential theft, malware infection, business email compromise | Social engineering in real time, remote access scams, wire fraud |
Targets | Smartphone users, online shoppers, busy professionals | Email users, employees, consumers | Older adults, people caught off guard |
Smishing keeps evolving, but the core tactics usually involve impersonation and urgency. The examples below are among the most common patterns seen in current text scams.
Delivery and package smishing is one of the most common forms of SMS scams. These texts usually appear to come from well-known carriers such as FedEx, UPS, or the US Postal Service. The text often mentions a problem with your delivery, such as a missed drop-off, an address issue, a customs delay, or a small fee needed to release the package. The goal is to make you click a link that leads to a fake page, where scammers can steal your information.
Warning signs include vague wording, unexpected tracking links, strange domains, and pressure to act fast before the package is returned.
People who shop online frequently are especially vulnerable, since they’re more likely to have real deliveries in progress.
An example of a delivery smishing text: Your parcel could not be delivered due to an address issue. Confirm redelivery now: usps-track-help.com.
These messages appear to come from your bank, card issuer, payment app, or an online store. They warn you about suspicious activity on your account and push you to act immediately by clicking a link or calling a number. In reality, the goal is to steal sensitive financial information like PINs, passwords, and bank account or credit card details.
This type of scam works because fraud alerts are something many people take seriously, and rightly so. Busy adults, older people, and anyone already concerned about account security are particularly vulnerable.
Common warning signs include requests for login details, prompts to reply with words like “YES” or “NO,” and callback numbers.
An example of a bank alert smishing scam: Did you authorize a $489.22 purchase? Reply NO or call 800-555-0192 immediately to secure your account.
Pro tip: Security alerts help you spot suspicious activity early, but they should come from services you already trust, not in unexpected texts. NordProtect’s security alerts and notifications are designed to provide that kind of verified warning.
This scam preys on the hope of getting something for nothing. The message claims you have won cash, a gift card, a mobile phone, a trip, or another reward and tells you to click a link, pay a small fee, or provide personal information to collect it.
The lottery scam tactic is especially effective against people who frequently enter promotions, shop online often, or are more likely to respond to limited-time offers.
Common warning signs include winnings in lotteries you didn’t enter, requests for upfront fees or tax payments, and rewards that seem unusually generous.
An example of a prize smishing scam: Congrats! Your number was selected for a $1,000 Target gift card. Claim now before midnight: target-reward-center.net.
In support impersonation scams, the scammer pretends to be a technical representative of Apple, Microsoft, Amazon, PayPal, or your mobile carrier. The text may warn about suspicious account activity, a billing problem, or another issue that requires you to call a support number, share a verification code, or install remote access software.
Common warning signs include support outreach you didn’t request, pressure to act immediately, requests for gift cards or cryptocurrency, and instructions to share one-time codes or grant remote access to your device.
Older adults and less confident tech users are often singled out, but these scams can catch anyone off guard.
An example of a customer support impersonation smishing scam: Unusual sign-in attempt detected. Call our security team now to prevent account suspension: 833-555-0118.
In this type of smishing attack, scammers pretend to be from a tax agency, police, the Social Security Administration, a toll authority, customs, or another official body. These messages usually inform about an alleged serious problem, such as an unpaid fine, suspended benefit, legal action, or account restriction.
Warning signs include threats, payment demands, legal language, and links to unofficial domains.
Older adults, immigrants, and people unfamiliar with how government agencies actually communicate may be more exposed.
An example of a government smishing scam: You have an outstanding road toll balance. Pay today to avoid penalties and license suspension: ezpass-securepay.com.
This scam is designed to create a small moment of panic around your email, streaming subscription, payroll portal, social media profile, or another online account. The message usually warns that your account needs to be verified, your billing details couldn’t be confirmed, or your access is about to be limited. The link in the text usually leads to a fake sign-in page built to steal your username, password, and sometimes MFA code.
Common warning signs include generic greetings, urgent deadlines, and login pages that look right at a glance but use strange URLs.
Students, employees, and people using many online accounts are common targets.
An example of an account verification smishing scam: We could not verify your billing details. Verify your account now to avoid interruption: netflix-billing-check.co.
This type of scam works by pretending to be someone you know and trust. The text may appear to come from a child, partner, friend, coworker, or manager and usually asks for urgent help, like sending money or responding to a sudden emergency. Parents, grandparents, and workplace teams are often targeted.
Warning signs include a new number, unusual writing style, urgency, secrecy, and requests involving money or codes.
An example of a family impersonation smishing scam: Hi Mom, this is my new number. My phone broke. Can you send me a verification code when it comes through? I need it urgently.
This version begins with messages that look accidental, such as “Hi Anna, are we still on for dinner?”, followed by “Sorry, wrong number.” In many cases, that’s not a mistake at all. The goal is to start a conversation, build rapport, and then turn it into a romance, crypto, or investment scam. People who are lonely, polite, or curious are especially vulnerable.
Warning signs include strangers who quickly become friendly, try to move the conversation to another app, or drift toward investing or personal details.
An example of a wrong-number smishing setup: Hi Sarah, I’m outside the restaurant. Are you close?
Smishing works because it exploits human psychology and everyday texting habits. The impact isn’t minor: The Federal Trade Commission (FTC) reported $470 million in losses tied to text-message scams in 2024, and impersonation scams overall accounted for nearly $3 billion in reported losses. The FBI has also warned about unpaid toll text scams, showing how widespread these campaigns have become.
On an emotional level, smishing works by pushing people to react quickly instead of pausing to verify. To do this, scammers rely on a few common psychological triggers.
Smishing texts are designed to look ordinary and urgent, which makes the warning signs easy to miss. If a text pushes you to respond quickly or share information, take a closer look to spot these red flags:
You can’t stop scammers from sending fake texts, but you can make them much less effective by building a few simple habits:
If you receive a suspicious text, don’t act on it right away. A quick pause can prevent a lot of problems.
If you suspect a smishing text message:
If you became a victim of smishing:
Don't be an easy target
Tax season deal: Up to 75% off identity theft protection
30-day money-back guarantee
View promotion details.
Ugnė is a content manager focused on cybersecurity topics such as identity theft, online privacy, and fraud prevention. She works to make digital safety easy to understand and act on.
The broadest identity theft protection available
Get notified and act immediately
30-day money-back guarantee
View promotion details.
Popular articles
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. Service logos displayed in dark web monitoring alerts are provided by Logo.dev and represent services where users have accounts. These logos are included in alerts to help users quickly identify which service may have experienced a data breach affecting their personal information.
However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.
©2025 NordProtect. All rights reserved