Understanding the Origin of Scam and Spam Messages

 

Understanding the Origin of Scam and Spam Messages

Despite heightened security measures by telcos like #Globe scam and spam texts persist. So, how are these messages infiltrating your inbox? Let’s delve into the details.

 Evolution of Scam Strategies

Scammers have adapted to bypass traditional cellular networks by leveraging internet-based messaging platforms. This evolution was triggered when telcos like Globe initiated a block on all person-to-person SMS containing links in September 2022, followed by a restriction on app-to-person SMS.

The clampdown on conventional SMS scams has driven fraudsters to explore alternative avenues, successfully circumventing telco filters.

Internet-Based Messaging Platforms

In response to the stringent security measures on SMS, scammers have turned to internet-based messaging platforms to target mobile phone users. These platforms allow them to evade cellular networks and even utilize foreign mobile numbers. These platforms encompass:

  • Over the top (OTT) media services or chat apps
  • Rich Communication Services (RCS) chats for Android users
  • iMessage for Apple users

For safety, avoid engaging with or clicking links in chat messages that contain suspicious links, and disregard unsolicited calls from unknown numbers, both foreign and local.

Spoofing

Scammers employ sophisticated methods such as IMSI catchers, or fake cell towers. These portable devices imitate real cell towers to intercept mobile communications. Scammers can then dispatch messages using spoofed sender IDs via the 2G network, making their messages appear as official communications from credible sources.

Spoofed messages often lure you with attractive offers and then prompt you to click links, which redirect you to harmful websites. This is how fraudsters gather your information to access your bank accounts or e-wallets.

This technique, known as spoofing, makes it exceedingly challenging for you to identify the fraud. To assist its customers in distinguishing genuine customer SMS from spoofed messages, Globe has ceased using links in its official customer advisories.

Stay Informed and Alert

Anton Bonifacio, Globe’s Chief Information Security Officer and Chief AI Officer, stressed that the new wave of spam and scam messages do not traverse the cellular network and are therefore beyond the reach of telco filters.

“Cunning fraudsters persistently find ways to circumvent our security measures. As scammers modify their tactics, it’s imperative for you to remain extra alert and stay informed,” Bonifacio advised.

Consequently, you should consistently verify the authenticity of messages, particularly those with links, and report any suspicious texts to your mobile provider. You may also enable the spam filter on your device.

By maintaining vigilance, you can help counter the surge of scam texts and safeguard yourself from fraud.

Globe actively blocks spam and scam SMS and fraud-associated SIMs in its network to protect you from scammers. It also continues to invest in cutting-edge technologies and forms strategic alliances with relevant stakeholders to better shield customers from persistent threats.

If you encounter any suspicious message, submit a report via Globe’s #StopSpam portal.

To discover more about Globe, visit https://www.globe.com.ph/.

FAQs

  1. What are the new tactics used by scammers?

    • Scammers are now using internet-based messaging platforms and spoofing techniques to send scam and spam messages.
  2. How can I protect myself from scam and spam messages?

    • Avoid engaging with suspicious links, ignore unsolicited calls from unknown numbers, double-check the authenticity of messages, report suspicious texts to your mobile provider, and activate the spam filter on your device.
  3. What is Globe doing to combat scam and spam messages?

    • Globe proactively blocks spam and scam SMS and fraud-linked SIMs in its network. It also invests in the latest technologies and forms strategic partnerships to better protect customers from persistent threats.

Post a Comment

Previous Post Next Post

Comments

Facebook