Spam SMS's are unwanted text messages. They're usually someone promoting a product or service, or attempting to scam you into providing personal information for fraudulent reasons.
These may be seen as an annoyance but, in more serious cases, can result in financial loss.
The level of spam SMS sophistication has been steadily increasing as senders attempt to mimic potentially legitimate customer messages. Examples received by our customers include:
In some countries, spam SMS now represents 10% of all SMS traffic. And it's on the rise within the UK.
The control and management of SMS spam is an important way of improving security and the customer experience.
Smishing/phishing - the fraudulent attempt to obtain sensitive information (e.g. usernames, passwords and credit card details) by pretending to be a trustworthy entity in an electronic communication. These attacks may often use the same sender address as valid messages. They may be present in valid dialogues with banks, government departments or service providers. The attacks are intelligent, dangerous and well implemented. Smishing occurs in different forms and against nearly all subscriber brands.
SMS spam - any unwanted or unsolicited text message sent indiscriminately to your mobile phone, often for commercial purposes.
We take the security of our customers very seriously. We're therefore taking a number of initiatives to help combat this security threat. One crucial element is the implementation of an SMS spam and smishing prevention function.
This function is a highly sophisticated network-based security element. It will analyse the attributes and content of SMS messages sent on our network. Based on existing criteria and active learning, it will decide the legitimacy of an SMS and whether or not it should be allowed to proceed.
The plan is to implement spam and smishing prevention for all 1pMobile customers.
The spam and fraud control solution is broken down into three layers:
Automatic and manual interventions are used in our techniques to detect spam campaigns by employing various detection methods. Here are a few examples.