SMS Phishing (Smishing) Attack
Attack Trigger
Urgent text message impersonating a bank, carrier, or delivery service
What Attackers Want
Payment card details or banking credentials
How This Attack Works
Smishing uses SMS text messages to trick victims into clicking malicious links or calling fake support numbers. Common lures include fake package delivery holds, bank fraud alerts, and prize notifications. Links lead to credential-harvesting pages optimized for mobile screens.
Red Flags to Watch For
- ✗Text arrives from an unknown number, not a registered short code
- ✗Link uses a URL shortener or an unfamiliar domain
- ✗Message claims a package is held or a fee is due for delivery
- ✗Requests your SSN, card number, or PIN via the linked page
- ✗Grammar errors or generic greeting ("Dear Customer")
- ✗Urgency: you must act within hours or lose access
Known Malicious Domains
These domains have been associated with this attack. Never click links going to these addresses.
- usps-txt-delivery.comMALICIOUS
- bank-sms-verify.netMALICIOUS
- sms-prize-claim.comMALICIOUS
- txt-alert-secure.netMALICIOUS
Glance automatically blocks emails from domains on this list. Domain list is not exhaustive — attackers register new domains continuously.
How Glance Stops This
- Domain similarity analysis catches lookalike sender addresses at millisecond speed
- SPF / DKIM / DMARC validation flags authentication failures before you ever see the email
- VirusTotal + Google Safe Browsing checks every link in real time
- Urgency language detection scores the email higher for manual review
- Known malicious domain blocklist updated continuously from live scan data
Don't wait to get hit.
Glance scans every incoming email against 12 detection layers — including the exact tactics described above — before it reaches your inbox.
Protect My Inbox — Free