7 Shocking Smishing Scams The FBI Is Warning Americans To Delete Immediately
The digital threat landscape is evolving rapidly, and the Federal Bureau of Investigation (FBI) is sounding the alarm on a massive surge in "smishing" attacks, urging the public to exercise extreme caution with unsolicited text messages. Smishing, a portmanteau of SMS (Short Message Service) and phishing, involves cybercriminals using text messages to trick victims into clicking malicious links, downloading malware, or divulging sensitive Personally Identifiable Information (PII). As of today, December 19, 2025, the FBI, often in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA), has highlighted specific, highly effective schemes that are moving across the nation, targeting both iPhone and Android users with alarming success.
This isn't just spam; it's a sophisticated form of social engineering where attackers are leveraging advanced techniques, sometimes even augmented with AI-generated content, to impersonate legitimate entities like banks, government agencies, and delivery services. The sheer volume and convincing nature of these malicious SMS campaigns—particularly those related to unpaid road tolls and package delivery issues—have prompted federal agencies to issue stark warnings, emphasizing that deleting these texts immediately is often the best defense. Understanding the current tactics of these cybercriminals is the critical first step in protecting your financial security and digital identity.
The Anatomy of a Smishing Attack: What the FBI is Seeing Now
The latest FBI warnings detail how cybercriminals are perfecting their craft, moving beyond poorly worded texts to highly convincing, context-aware messages that exploit common anxieties, like late fees or missed deliveries. The primary goal remains the same: to inject malware onto your device or steal credentials that can lead to financial fraud, identity theft, or even ransomware attacks.
The Top 5 Current Smishing Schemes You Must Recognize
Based on recent alerts and reports filed with the Internet Crime Complaint Center (IC3), several schemes stand out for their prevalence and effectiveness:
- The Unpaid Toll or Road Services Scam: This is one of the most widespread and concerning recent smishing campaigns. The text typically claims you have an outstanding balance for a road toll (e.g., EZPass VA) and threatens late fees or penalties if you don't click the provided link to pay immediately. The urgency is designed to bypass critical thinking.
- The Package Delivery Impersonation: Scammers send texts pretending to be major carriers like FedEx, UPS, or USPS. The message states there is a problem with your delivery—a required customs fee, an incomplete address, or a missed delivery notification—and prompts you to click a link to reschedule or pay a small fee. This scam capitalizes on the massive volume of online shopping.
- The Bank or Credit Union Alert: These texts claim suspicious activity has been detected on your account and instruct you to "verify" the transaction by clicking a link or calling a spoofed number (vishing). The link directs you to a highly realistic phishing landing page designed to steal your login credentials and two-factor authentication (2FA) codes.
- The Government Agency Phish (IRS/SSA): Although less common via SMS than email, smishing texts sometimes impersonate the IRS, Social Security Administration (SSA), or even the FBI itself, demanding immediate action regarding a tax issue, a benefit suspension, or a subpoena. The goal is to instill fear and panic.
- The Fake Job Offer or Survey Scam: These texts promise easy money, often disguised as a quick survey or a high-paying, remote job offer. The link leads to a site that collects extensive PII, including your full name, address, and sometimes banking details for "direct deposit setup," which is then used for identity theft.
7 Non-Negotiable Rules to Defend Against Smishing Texts
Defending against smishing requires a combination of technical awareness and behavioral discipline. The FBI and CISA consistently advise that proactive steps are essential to avoid becoming a victim of these mobile-based attacks.
- Never Click the Link: This is the golden rule. If you receive an unsolicited text from a company, bank, or government agency, never click the link provided in the text message. Links in smishing texts often lead to malicious websites that automatically download malware or harvest your credentials.
- Verify Legitimacy Independently: If a text claims to be from your bank or a utility company, open a new browser window and navigate to the official website or call the official customer service number listed on their website (not the one in the text). Verify the claim through legitimate channels.
- Be Skeptical of Urgency and Threats: Smishing texts rely on social engineering tactics like creating a sense of urgency (e.g., "immediate payment required," "account suspended," "late fee penalty") to prevent you from thinking clearly. Legitimate organizations rarely use aggressive, unannounced SMS messages for critical financial matters.
- Check the Sender's Number: While numbers can be spoofed, look for inconsistencies. Texts from legitimate organizations often come from a short code (5 or 6 digits), not a standard 10-digit number. If the text is from an unexpected or random-looking mobile number, it is almost certainly a scam.
- Use Strong Mobile Security: Ensure your mobile device's operating system (iOS or Android) is always updated to the latest version. These updates often contain critical security patches that protect against known exploits used by smishing malware. Consider using mobile security software.
- Enable Two-Factor Authentication (2FA) Everywhere: Even if a scammer manages to steal your password via a phishing site, 2FA (especially app-based authentication like Google Authenticator or Microsoft Authenticator, rather than SMS-based 2FA) acts as a critical second layer of defense.
- Delete the Message Immediately: Once you have identified the text as suspicious and verified that it is not legitimate, delete it. Do not reply, as replying confirms your number is active and makes you a target for future, more sophisticated attacks.
Reporting and Recovery: Your Role in the Cyber Defense Ecosystem
The fight against smishing is a collective effort. By reporting every suspicious text, you provide crucial intelligence to federal law enforcement and cybersecurity agencies, helping them track down the cybercriminals and issue timely warnings to others.
What to Do If You Receive a Smishing Text
If you receive a suspicious text, follow this three-step process:
- Do Not Click or Reply: Delete the text immediately.
- Forward the Text: Forward the suspicious text message to the short code 7726 (SPAM). This service, supported by major wireless carriers, helps them track and block the malicious numbers and links.
- Report to IC3: File a complaint with the FBI’s Internet Crime Complaint Center (IC3) at IC3.gov. When filing, include the attacker's phone number, the date and time of the text, and the content of the message. This data is vital for law enforcement investigations.
Immediate Steps If You Clicked the Link or Provided Information
Accidents happen, and the sophistication of modern smishing means even the most vigilant individuals can be fooled. If you clicked a link or entered any PII, immediate action is required:
- Isolate the Device: Turn off Wi-Fi and cellular data immediately to prevent any potential malware from communicating with the attacker's server.
- Change Passwords: Change the passwords for any accounts that may have been compromised, especially banking, email, and social media accounts. Use a strong password manager.
- Notify Your Bank/Credit Card Company: If you entered any financial information, call your bank or credit card company immediately to report the potential fraud and monitor for unauthorized transactions.
- Monitor Credit Reports: Place a fraud alert on your credit reports with the three major credit bureaus (Equifax, Experian, and TransUnion) to prevent identity theft.
- Run a Full Security Scan: Use reputable anti-malware software to scan your phone for any unauthorized applications or malicious code that may have been downloaded without your knowledge.
The rise of smishing is a clear indicator that cybercriminals are adapting to the mobile-centric world, focusing on the device we use most frequently. The FBI's continuous warnings, particularly regarding schemes like the fake toll charge and delivery notifications, underscore the necessity of constant vigilance. By understanding the tactics of social engineering, adhering to strict mobile security protocols, and actively reporting malicious activity to the IC3, you can significantly reduce your risk and contribute to the broader effort to combat this pervasive form of cybercrime.
Detail Author:
- Name : Amir Gulgowski MD
- Username : zvolkman
- Email : andreane.heidenreich@gmail.com
- Birthdate : 1974-07-10
- Address : 342 Schultz Plains Aliyaville, WY 09255
- Phone : 651.869.6645
- Company : Larson Ltd
- Job : Budget Analyst
- Bio : Dicta sequi laboriosam amet odio ab. Optio iure eos qui eum assumenda itaque occaecati. Autem deleniti esse dolorum mollitia voluptas. Quae sunt fuga expedita reiciendis.
Socials
twitter:
- url : https://twitter.com/michelemcdermott
- username : michelemcdermott
- bio : Nemo est totam enim porro. Veritatis rerum dolor ex et blanditiis explicabo. Est ut rerum qui quidem.
- followers : 5263
- following : 2736
linkedin:
- url : https://linkedin.com/in/michele_dev
- username : michele_dev
- bio : Autem odit odit ut aperiam.
- followers : 1013
- following : 2170
facebook:
- url : https://facebook.com/michele.mcdermott
- username : michele.mcdermott
- bio : Praesentium dolorum sunt asperiores omnis.
- followers : 1695
- following : 496
