Skip to content

Mobile phishing attacks are skyrocketing, causing businesses to exhibiting an inflated sense of security confidence

Over half of businesses encountered issues due to voice or text phishing attempts resulting in executive impersonation, as per a study by Lookout.

Mobile phishing scams are on the rise, yet companies show a sense of complacency.
Mobile phishing scams are on the rise, yet companies show a sense of complacency.

Mobile phishing attacks are skyrocketing, causing businesses to exhibiting an inflated sense of security confidence

In the rapidly evolving digital landscape, businesses are increasingly facing the threat of mobile phishing scams and executive impersonation attacks. Recent statistics reveal that nearly 60% of companies have experienced executive impersonation scams via text or voice, and 77% have experienced at least one such attack in the past six months [1].

Hackers are employing sophisticated tactics, using mobile voice and text phishing messages to trick workers into revealing passwords. One notorious group, Scattered Spider, regularly tricks help-desk workers into resetting passwords and granting hackers access to corporate networks [1]. Moreover, hackers are impersonating U.S. government officials using AI-generated voice cloning technology, as warned by the FBI in May [2].

To combat these threats, Lookout, a leading cybersecurity company, emphasizes the need for a multi-layered approach. This approach combines advanced technical controls, user training, and continuous monitoring [3].

Firstly, implementing Zero-Trust Security, especially for email, is crucial. This involves enforcing strong email authentication standards like SPF, DKIM, and DMARC to stop spoofing at the source. Strict DMARC policies reduce brand spoofing and impersonation risks, critical for stopping attacks targeting executives [1].

Secondly, prioritizing high-risk users, such as executives and finance personnel, with dedicated protections is essential. Examples include protected inboxes, stronger data loss prevention (DLP) rules, and specialized alerting when suspicious messages arrive [1].

Thirdly, continuous monitoring and analytics for anomalies in messaging and email behaviors help identify unusual activity like malicious forwarding or mass mailings. Regularly updating detection rules based on emerging phishing patterns improves defenses against sophisticated threats [1].

Fourthly, adopting strong Multi-Factor Authentication (MFA) including biometrics on mobile devices provides a robust barrier against unauthorized access [2]. Passwordless authentication solutions, supported by FIDO Alliance technologies, significantly reduce the efficacy of credential phishing [3].

Fifthly, conducting realistic, contextualized phishing training that mirrors the actual environment, including simulations of attacks impersonating executives or vendors with plausible narratives, builds user muscle memory and increases the chance of spotting and reporting phishing attempts quickly [4].

Lastly, establishing clear reporting channels and a security-minded culture encourages employees to question unusual requests and verify through secondary means before acting [1][4]. Regularly auditing mobile app permissions and staying alert to evolving mobile phishing attack techniques targeting voice and text channels is also crucial [2].

Despite the confidence some security leaders have in their employees' ability to spot a phishing attempt, more than half reported incidents where employees fell victim to executive impersonation scams via text message [1]. This situation leaves businesses overconfident and vulnerable to modern threats. Therefore, it is essential for businesses to reassess their cybersecurity strategies, moving beyond mere confidence to implement robust solutions that provide real-time visibility and proactive protection.

References: [1] Lookout. (2021). Mobile Phishing: The New Threat Landscape. Retrieved from https://www.lookout.com/resources/reports/mobile-phishing-the-new-threat-landscape [2] Federal Bureau of Investigation. (2021). FBI Warns of Increasing Use of AI-Generated Voice Cloning Technology by Cybercriminals. Retrieved from https://www.fbi.gov/news/pressrel/press-releases/fbi-warns-of-increasing-use-of-ai-generated-voice-cloning-technology-by-cybercriminals [3] FIDO Alliance. (2021). Passwordless Authentication. Retrieved from https://fidoalliance.org/specifications/fido/passwordless/latest/ [4] KnowBe4. (2021). The State of the Phish 2021. Retrieved from https://www.knowbe4.com/resources/the-state-of-the-phish-2021-report

Privacy can be compromised through mobile phishing scams that hackers employ using voice and text messages, tricking workers into revealing sensitive information. To combat these threats, a multi-layered approach to cybersecurity is essential, including Zero-Trust Security, dedicating protections to high-risk users, continuous monitoring, strong Multi-Factor Authentication, and regular phishing training. Despite confidence in employees' ability to spot a phishing attempt, they can still fall victim to these scams, leaving businesses vulnerable to modern threats. Therefore, businesses must reassess their cybersecurity strategies and implement robust solutions for real-time visibility and proactive protection.

Read also:

    Latest