Key Takeaways
- In 2023, smishing attacks represented 12.5% of all mobile phishing incidents reported globally, marking a 47% increase from 2022
- The FBI's IC3 received over 298,000 complaints about smishing and phishing in 2022, with smishing comprising 8.2% of those
- Verizon's 2023 DBIR noted smishing as involved in 11% of social engineering breaches in the financial sector
- In the US, 68% of adults aged 18-24 reported receiving at least one smishing attempt in 2023 per FTC survey data
- Women comprised 54.2% of smishing victims reporting to IC3 in 2022, with higher susceptibility in retail banking scams
- Seniors over 60 years old accounted for 22.7% of smishing financial loss complaints to FTC in 2023, totaling $120 million
- Smishing attacks most commonly use COVID-19 package delivery lures, accounting for 29% of analyzed SMS phishing in 2023
- 42% of smishing messages impersonate banks using shortened URLs leading to credential harvesters per Proofpoint 2024
- Zero-click smishing exploits via iMessage affected 11% of iOS devices in Lookout's 2023 detections
- Global smishing losses reached $1.2 billion in 2023 per Chainalysis crypto scam report tied to SMS vectors
- Average smishing loss per victim was $1,450 in US IC3 2022 complaints, totaling $52 million from smishing alone
- Enterprise downtime from smishing breaches averaged 14 hours costing $45,000 per incident per IBM Cost of Data Breach 2023
- 82% of organizations use AI-based SMS filtering reducing smishing success by 65% per Gartner 2024 poll
- Multi-factor authentication blocked 99.9% of smishing account takeovers in Microsoft's 2023 Digital Defense Report
- Employee training reduced smishing click rates by 40% in Proofpoint's 2023 simulation benchmarks across 1,000 firms
Smishing attacks are surging globally, with steep financial losses across many demographics.
Attack Vectors and Techniques
Attack Vectors and Techniques Interpretation
Detection, Prevention, and Response
Detection, Prevention, and Response Interpretation
Financial and Operational Impacts
Financial and Operational Impacts Interpretation
Prevalence and Trends
Prevalence and Trends Interpretation
Prevalence and Trends, source url: https://www.oas.org/ext/en/cybersecurity/reports/2023-cybercrime-trends-la.pdf
Prevalence and Trends, source url: https://www.oas.org/ext/en/cybersecurity/reports/2023-cybercrime-trends-la.pdf Interpretation
Victim Demographics
Victim Demographics Interpretation
Sources & References
- Reference 1PROOFPOINTproofpoint.comVisit source
- Reference 2IC3ic3.govVisit source
- Reference 3VERIZONverizon.comVisit source
- Reference 4LOOKOUTlookout.comVisit source
- Reference 5ZSCALERzscaler.comVisit source
- Reference 6DOCSdocs.apwg.orgVisit source
- Reference 7IBMibm.comVisit source
- Reference 8SPLUNKsplunk.comVisit source
- Reference 9MIMECASTmimecast.comVisit source
- Reference 10FTCftc.govVisit source
- Reference 11CONSUMERconsumer.ftc.govVisit source
- Reference 12PEWRESEARCHpewresearch.orgVisit source
- Reference 13ACTIONFRAUDactionfraud.police.ukVisit source
- Reference 14USus.norton.comVisit source
- Reference 15HIMSShimss.orgVisit source
- Reference 16EDUCAUSEeducause.eduVisit source
- Reference 17AARPaarp.orgVisit source
- Reference 18ZIMPERIUMzimperium.comVisit source
- Reference 19CISCOcisco.comVisit source
- Reference 20RECORDEDFUTURErecordedfuture.comVisit source
- Reference 21SECURELISTsecurelist.comVisit source
- Reference 22FLASHPOINTflashpoint.ioVisit source
- Reference 23ABNORMALSECURITYabnormalsecurity.comVisit source
- Reference 24JAMFjamf.comVisit source
- Reference 25CHAINALYSISchainalysis.comVisit source
- Reference 26UKFINANCEukfinance.org.ukVisit source
- Reference 27SOPHOSsophos.comVisit source
- Reference 28RISKrisk.lexisnexis.comVisit source
- Reference 29PONEMONponemon.orgVisit source
- Reference 30MUNICHREmunichre.comVisit source
- Reference 31SBAsba.govVisit source
- Reference 32GARTNERgartner.comVisit source
- Reference 33AKAaka.msVisit source
- Reference 34TWILIOtwilio.comVisit source
- Reference 35FORRESTERforrester.comVisit source
- Reference 36DARKTRACEdarktrace.comVisit source
- Reference 37T-MOBILEt-mobile.comVisit source
- Reference 38SANSsans.orgVisit source
- Reference 39SERVICESservices.google.comVisit source
- Reference 40ENISAenisa.europa.euVisit source
- Reference 41INTERPOLinterpol.intVisit source
- Reference 42OASoas.orgVisit source
- Reference 43ANTIFRAUDCENTRE-CENTREANTIFRAUDEantifraudcentre-centreantifraude.caVisit source
- Reference 44ACCCaccc.gov.auVisit source
- Reference 45EDPBedpb.europa.euVisit source
- Reference 46CERT-INcert-in.org.inVisit source
- Reference 47SAFERNETsafernet.org.brVisit source
- Reference 48ITWEBitweb.co.zaVisit source
- Reference 49KNOWBE4knowbe4.comVisit source
- Reference 50ISACAisaca.orgVisit source
- Reference 51COSNcosn.orgVisit source
- Reference 52VAOIGvaoig.govVisit source
- Reference 53FLEXJOBSflexjobs.comVisit source
- Reference 54BROADBANDUSAbroadbandusa.ntia.govVisit source
- Reference 55VARONISvaronis.comVisit source
- Reference 56COMMONSENSEMEDIAcommonsensemedia.orgVisit source
- Reference 57NVLPUBSnvlpubs.nist.govVisit source
- Reference 58RESEARCHresearch.checkpoint.comVisit source
- Reference 59PHISHLABSphishlabs.comVisit source
- Reference 60FIRSTORIONfirstorion.comVisit source
- Reference 61SMISHINGsmishing.ioVisit source
- Reference 62GSMAgsma.comVisit source
- Reference 63DEEPINSTINCTdeepinstinct.comVisit source
- Reference 64USAusa.visa.comVisit source
- Reference 65ELLIPTICelliptic.coVisit source
- Reference 66SENSEONsenseon.comVisit source
- Reference 67BLACKPOINTCYBERblackpointcyber.comVisit source
- Reference 68IDTHEFTCENTERidtheftcenter.orgVisit source
- Reference 69HHShhs.govVisit source
- Reference 70CISAcisa.govVisit source
- Reference 71BAKERLAWbakerlaw.comVisit source
- Reference 72QUALTRICSqualtrics.comVisit source
- Reference 73DELOITTEwww2.deloitte.comVisit source
- Reference 74CNILcnil.frVisit source
- Reference 75EVENTUSeventus.comVisit source
- Reference 76COFENSEcofense.comVisit source
- Reference 77SECURITYsecurity.googleblog.comVisit source
- Reference 78TERRANOVASECURITYterranovasecurity.comVisit source
- Reference 79NEUSCHNEEneuschnee.comVisit source
- Reference 80IDCidc.comVisit source
- Reference 81FSISACfsisac.comVisit source
- Reference 82OKTAokta.comVisit source






