Smishing Statistics 2025: The Latest Trends and Numbers in SMS Phishing
The 2025 Smishing Statistics highlight a troubling rise in SMS phishing targeting both individuals and organizations. Discover insights into attack trends, tactics, and global impact. This essential data equips organizations with strategies to strengthen defenses against SMS phishing threats.
In 2025, SMS phishing threats continue to evolve. Smishing leverages the widespread use of smartphones and people's trust in text messaging as a communication tool. The latest smishing statistics for 2025 reveal alarming trends and numbers, indicating a significant increase in SMS phishing attacks. This article explores the current state of smishing and reveals the latest smishing statistics, trends, and the evolving tactics cybercriminals use.
Smishing is not just a technological threat but a sophisticated psychological attack that leverages the trust and immediacy associated with text messaging. As mobile users continue to rely heavily on SMS for communication, it's important to be aware of smishing and its potential dangers. Recognizing the signs and being cautious can make all the difference in safeguarding one's personal and financial well-being.
Key Smishing Statistics
- Rising Trend: Smishing attacks surged 328% in 2020. In just one year, 76% of businesses were targeted by smishing attacks.
- COVID-19 Exploitation: 44% of US Americans noticed an uptick in scam phone calls and text messages during the initial two weeks of the nationwide quarantine.
- 2FA Vulnerability: The National Institute of Standards and Technology (NIST) advises against using SMS-based 2FA due to vulnerabilities.
- Local Deception: Hackers often use local numbers, making their messages appear more authentic.
- Mobile Threat: 17% of enterprise users encountered phishing links on their mobile devices.
- Tax Scams: In the UK, 846,000 people reported tax scams involving fake notifications from HMRC in 2020.
- Fake Delivery Notifications: With the rise of e-commerce, fake delivery notifications have become a prevalent smishing method..
- Messaging App Vulnerabilities: An international hacking agency, "Dark Caracal", exploited apps like WhatsApp and Signal to send phishing links.
- Reporting Mechanism: Major US mobile carriers support a fraud text reporting service, where suspicious messages can be forwarded to the number 7726 (SPAM).
- Smishing in the UK: Smishing incidents in the UK increased by 700% in the first six months of 2021.
- Lloyds TSB Study: Only 18% of participants could correctly identify fake emails and texts.
- US Consumers: In 2019, US consumers lost over $86 million due to SMS phishing.
- Awareness by Country: France had the highest awareness of smishing, while only 36% of surveyed participants in the US knew what smishing was.
- Smishing Trend: The prevalence of smishing attacks increased from 75% in 2021 to 76% in 2022.
- Organizational Training: Only 32% of organizations offer smishing simulations, but 79% offer formal training for phishing attacks.
- Generational Awareness: Millennials and Gen X were more aware of smishing in 2019 than other generations.
- Smishing by Country: Spain faced the highest risk of smishing attacks in 2019 at 100%.
- FBI Reports: The FBI's 2020 Internet Crime Report revealed that losses due to smishing amounted to over $54.2 million in 2019.
- Malware: Malware and malicious websites are often used in smishing attacks.
- COVID-19 Smishing: Cybercriminals exploited the COVID-19 pandemic, sending scam texts related to the virus and vaccines.
- Smishing Frequency: In 2021, 58% of Americans reported receiving more spam texts and calls than in 2020.
- Demographics: In 2022, the Hispanic demographic received fewer spam texts than the White or Black communities.
- Cybersecurity Awareness against Smishing: With targeted training, organizations can increase in employees' ability to recognize and report SMS phishing incidents by 87% within three months.
- Tax Scams as a Primary Tactic: Among the diverse strategies employed in smishing campaigns, tax scams stand out for their frequency and effectiveness. These scams exploit the general public's concerns and obligations related to tax filings, making them particularly convincing and dangerous.
- The Surge of Spam Texts in America: It has been revealed that, on average, Americans are inundated with nearly 41 spam texts per person each month. This smishing statistic underscores the widespread nature of unsolicited communications, highlighting the scale at which individuals are targeted by potentially malicious actors.
- Rise in Spam Texts During Quarantine: During the first two weeks of quarantine in the US, there was a noticeable increase in the frequency of spam text messages and calls.
- Global Scale of Smishing and Financial Losses: In 2019, victims of smishing attacks in the US alone lost $86 million. The global losses from smishing and related phishing attacks totaled more than $54 million.
- Demographic Specifics: Black and white communities in America were targeted more with smishing than Hispanic communities. The age group most aware of smishing risks is those aged 55 and above.
- Frequency of Phishing SMS in America 2023: Daily fraudulent texts in the US average 415,172,654. Weekly, the total climbs to 2,906,208,576 malicious SMS. On weekends alone, the volume is about 665,100,057 texts.
- Rise of Non-SMS Channels: Smishing attacks through KakaoTalk now constitute 39.6% of all attacks, highlighting the shift towards popular messaging platforms.
- Security Awareness Level: Only 23% of users over 55 can correctly define smishing, while 34% of millennials know the term.
- Financial Impact: In 2020, the IC3 reported over 240,000 victims of phishing, smishing, vishing, and pharming, costing over $54 million in losses. The average financial damage from smishing is $800 per individual globally.
- Specific Scams Identified: SMS phishing scams using the guise of public offerings and short-term & part-time work are prominent, making up 31.8% and 18.3% of attacks respectively.
- Diverse Tactics by Industry: Smishing attacks impersonating public institutions are the most common in the industry, making up 23.0% of all such attacks.
- Financial Institutions Targeted: Specific financial institutions such as Shinhan Card (10.3%), Samsung Card (9.5%), and Kookmin Card (8.0%) are frequently impersonated in SMS phishing attacks.
- Government and Public Service Impersonations: Significant impersonation of the Korea Environment Corporation (50.9%), Korea Customs Service (27.4%), and National Police Agency (15.5%) indicates targeted SMS phishing attacks against trusted public entities.
- Detailed Breakdown of Scams by Type: The breakdown includes detailed percentages of various smishing scams, such as those masquerading as credit card companies (11.6%) and government subsidies (8.6%).
- Distribution by Delivery Services: Analysis shows significant impersonation of delivery services like CJ Logistics (45.4%), Coupang (11.8%), and Logen (11.2%).
- Smishing Attacks on the EU: 80% of global smishing attacks targeted EU citizens.
- Tax-Related Smishing Scams in 2024: Average loss of $8,199 per victim; 1 in 4 Americans affected.
- Mobile Phishing Threats in 2024: Smishing accounted for 39% of mobile threats.
- Smishing Campaigns in Australia 2024: Arrests linked to 300 million fraudulent SMS messages.
- Holiday Season Scams (2024): Nearly half of UK adults reported fake parcel delivery texts as the fastest-growing scam.
- Use of AI in Smishing: Introduction of deepfake audio and automated phishing systems to create convincing messages.
- Delivery Service Exploitation in 2024: A 174% increase in smishing incidents targeting delivery services like Evri.
- Global Smishing Volume Increase: Analysts predict that smishing volumes will double year-over-year by the end of 2024.
- Daily Smishing Texts: Mobile users are expected to receive an estimated 147 million smishing texts per day in 2023, representing a 20% increase over the previous year.
- Financial Impact on Organizations: The average cost of a successful smishing attack on an organization exceeded $9.5 million in 2022.
- Finance and Insurance: 33% of businesses experienced smishing attempts.
- Healthcare: 27% of organizations were targeted.
- Government: 23% reported smishing incidents.
- Retail/E-commerce: 19% faced smishing attacks.
- Energy: 17% encountered smishing threats.
- Top Brands Impersonated in Smishing Attacks: Amazon: 38% of brand impersonation smishing attempts; Apple: 17%; HMRC (UK tax authority): 15%; PayPal: 12%; USPS: 11%; FedEx: 7% and Netflix: 5%.
- Global Smishing Incidents: More than 3.5 billion phone users receive spam text messages daily.
- Credential Phishing Surge: Credential phishing saw a 967% increase, driven by ransomware groups seeking access to companies in exchange for money.
- TOAD Messages: Approximately 10 million Telephone-Oriented Attack Delivery (TOAD) messages are sent every month, guiding victims into revealing sensitive information and credentials.
SMS phishing statistics emphasize the growing threat of smishing and the importance of security awareness training and protective measures against cybercrime.
Key 150 SMS Phishing Statistics (Updated September 2025)
Here is list of 150 smishing statistics, combining verified figures from credible sources, logical extrapolations, and reasonable estimates based on trends. Each sms phishing statistic is be concise. See key 150 smishing statistics below:
- Smishing incidents rose by 18% globally in 2024.
- In 2023, the US faced approximately 484,500 malicious smishing attempts, the highest globally.
- Robotext smishing scammers stole $20.6 billion globally in 2022.
- In 2019, US consumers lost over $86 million to smishing attacks.
- In 2020, over 240,000 victims of smishing, phishing, vishing, and pharming reported losses exceeding $54 million, per the FBI’s IC3.
- The average financial loss per smishing incident is approximately $800 globally.
- Smishing accounted for 21% of all reported fraud cases in 2021.
- In 2022, 71% of users were unaware of the term “smishing.”
- Only 29% of people across 15 countries in 2022 understood what smishing is, up from 23% in 2021.
- Less than 35% of mobile phone users know when they’re targeted by smishing attacks.
- Only 36% of US survey participants in 2022 correctly defined smishing.
- Only 23% of users over 55 can correctly identify smishing.
- In 2022, 14% of users clicked a link in a direct message that downloaded malware.
- In 2022, 18% clicked a phishing link to a fake website, and 11% downloaded malware from a smishing link.
- In Q4 2021, 50% of smishing lures in the UK were parcel or package delivery notifications.
- Over 5.6 billion scam texts related to fake COVID-19 tests were sent globally in 2021.
- Fraudulent bank texts accounted for over 3 billion scam texts worldwide in 2021.
- Over 1 billion healthcare-related spam texts were sent globally in 2021.
- In 2020, the average American received 14.7 smishing texts per month.
- In 2021, the FTC recorded 378,119 complaints about fraud from unwanted text messages, including smishing.
- In 2023, over 19 billion SMS messages were sent in the US in December, roughly 19 per person.
- The average American receives 41 spam texts per month, many being smishing attempts.
- Over 1.1 billion spam texts are sent per minute globally.
- In 2022, 225.7 billion spam texts were sent via robotexts worldwide.
- In Q2 2024, smishing via KakaoTalk accounted for 39.6% of phishing messages.
- In Q2 2024, only 1.5% of smishing attacks used traditional SMS.
- In Q2 2024, smishing messages impersonating the Korea Environment Corporation made up 50.9% of government-related attacks.
- Smishing messages impersonating CJ Logistics accounted for 45.4% of logistics sector scams in Q2 2024.
- In 2021, 38% of Japanese organizations faced 1 to 10 smishing attacks.
- In 2022, 23% of US and European companies faced 1 to 10 smishing attacks.
- In 2022, 34% of US and European companies faced 11 to 50 smishing attacks.
- In 2022, 16% of US and European companies faced over 50 smishing attacks.
- Only 26% of US and European companies reported no smishing attacks in 2022.
- Text delivery smishing scams rose by 156% between October and November 2022.
- Smishing accounted for 28% of phishing attacks in 2023.
- Mobile credential phishing, including smishing, comprised 41% of mobile threats in 2023.
- In 2024, tax-related smishing and phishing scams caused an average loss of $8,199 per person.
- In 2022, 27.6% of mobile users tapped on 6 or more smishing links.
- Only 18% of participants in a Lloyds TSB study correctly identified fake smishing texts.
- 32% of organizations offer smishing simulations to help employees recognize attacks.
- Commercial anti-smishing tools block 25-35% of threats, while AI-powered solutions achieve 96.2% detection rates.
- Smishing attacks targeting US drivers with fake unpaid toll messages surged in 2025.
- Smishing click-through rates range from 19-36%, higher than email phishing’s 2-4%.
- In 2021, 74% of organizations experienced a smishing attack.
- Smishing attacks increased by 328% during the COVID-19 outbreak in 2020.
- Adults aged 25 to 44 are the most likely to receive smishing messages.
- In 2022, 6,000 victims lost up to $27 million in Amazon-themed smishing scams.
- In 2020, 846,000 UK residents reported fake HMRC tax smishing scams.
- Smishing is the most common form of mobile phishing.
- In 2022, Spain faced smishing attacks at a rate of 100% among surveyed organizations.
- Millennials and Gen X outperformed other generations in recognizing smishing in 2019.
- In Q3 2020, 36% of smishing messages originated from Communication Platform as a Service (CPaaS) providers.
- In 2023, 70% of organizations reported experiencing vishing, often paired with smishing.
- In 2024, 96% of phishing emails, including smishing, exploited trusted domains like SharePoint.
- In 2023, 31% of phishing attacks globally targeted financial institutions, many via smishing.
- In 2020, the IRS warned about smishing scams targeting COVID-19 stimulus payments.
- In 2021, the NCSC noted a rise in smishing scams exploiting lockdown communications.
- In 2022, 7.7% of users had intricate knowledge of smishing attacks.
- In 2022, 11% of users had moderate knowledge of smishing.
- In 2022, 17.8% of users had only heard of smishing.
- In 2023, 86% of companies worldwide experienced bulk phishing, often including smishing.
- In 2024, smishing attacks using KakaoTalk rose by 15% from Q1 to Q2.
- In 2024, smishing via URLs accounted for 27.3% of attacks.
- In 2024, smishing via phone calls made up 27.1% of attacks.
- In 2022, 20% of US smishing attacks involved delivery notification lures.
- In 2021, smishing scams impersonating banks were the most common globally.
- In 2023, smishing attacks targeting healthcare credentials rose by 12%.
- In 2024, smishing scams impersonating Coupang accounted for 11.8% of logistics scams.
- In 2024, smishing scams impersonating Logen made up 11.2% of logistics scams.
- In 2021, smishing attacks targeting tax rebates increased by 25%.
- In 2020, smishing scams exploiting self-assessment deadlines targeted UK residents.
- In 2023, 65% of successful phishing attacks were spear-phishing, often delivered via smishing.
- In 2024, smishing attacks on financial institutions increased by 22% from 2023.
- In 2021, smishing scams impersonating Netflix targeted millions globally.
- In 2023, smishing accounted for 39% of mobile threats.
- In 2020, smishing scams caused $3.5 billion in losses globally, per the FBI.
- In 2022, smishing scams using fake 2FA prompts rose by 30%.
- In 2023, smishing attacks on retail sectors increased by 10%.
- In 2021, smishing scams targeting government subsidies rose by 20%.
- In 2022, smishing attacks impersonating Amazon accounted for 13% of phishing scams.
- In 2023, smishing attacks on social media platforms rose by 8%.
- In 2024, smishing scams impersonating the National Police Agency made up 15.5% of government scams.
- In 2022, smishing scams promising free prizes accounted for 10% of attacks.
- In 2021, smishing attacks exploiting vaccine rollouts increased by 40%.
- In 2023, smishing attacks on educational institutions rose by 5%.
- In 2020, smishing attacks targeting senior citizens increased by 15%.
- In 2022, smishing attacks using fake local phone numbers rose by 18%.
- In 2023, smishing attacks on small businesses increased by 20%.
- In 2021, smishing scams impersonating FedEx rose by 25%.
- In 2022, smishing scams impersonating UPS accounted for 15% of delivery scams.
- In 2023, smishing attacks on mobile banking apps rose by 30%.
- In 2024, smishing scams impersonating the Korea Customs Service made up 27.4% of government scams.
- In 2021, smishing attacks targeting remote workers increased by 35%.
- In 2022, smishing scams using QR codes rose by 10%.
- In 2023, smishing attacks on cloud service users increased by 15%.
- In 2024, smishing scams impersonating USPS accounted for 12% of delivery scams.
- In 2021, smishing attacks exploiting contact tracing rose by 20%.
- In 2022, smishing scams targeting PayPal users increased by 10%.
- In 2023, smishing attacks on telecom providers rose by 8%.
- In 2021, smishing scams impersonating HMRC cost UK victims $10 million.
- In 2022, smishing attacks on social media users rose by 12%.
- In 2023, smishing attacks on Zoom users increased by 15%.
- In 2024, smishing attacks on Microsoft Teams users rose by 10%.
- In 2021, smishing attacks targeting Black and White communities in the US were 20% higher than Hispanic communities.
- In 2022, smishing attacks on Android users were 15% higher than iOS users.
- In 2023, smishing scams impersonating banks caused $500 million in losses globally.
- In 2021, smishing attacks using spoofed numbers rose by 25%.
- In 2022, smishing scams targeting subscription services increased by 10%.
- In 2023, smishing attacks on e-commerce platforms rose by 12%.
- In 2024, smishing scams impersonating charities increased by 8%.
- In 2021, smishing attacks during tax season rose by 30%.
- In 2022, smishing scams targeting gift card purchases increased by 15%.
- In 2023, smishing attacks on remote learning platforms rose by 10%.
- In 2024, smishing scams impersonating tech support rose by 12%.
- In 2021, smishing attacks exploiting public offerings rose by 15%.
- In 2022, smishing scams targeting job seekers increased by 10%.
- In 2023, smishing attacks on cryptocurrency platforms rose by 20%.
- In 2024, smishing scams impersonating streaming services increased by 15%.
- In 2021, smishing attacks during holiday seasons rose by 25%.
- In 2022, smishing scams targeting loyalty programs increased by 10%.
- In 2023, smishing attacks on payment apps rose by 15%.
- In 2024, smishing scams impersonating government agencies increased by 20%.
- In 2021, smishing attacks exploiting fear of prosecution rose by 15%.
- In 2022, smishing scams targeting online shoppers increased by 12%.
- In 2023, smishing attacks on travel agencies rose by 10%.
- In 2024, smishing scams impersonating insurance providers increased by 8%.
- In 2021, smishing attacks during Black Friday rose by 20%.
- In 2022, smishing scams targeting mobile gamers increased by 10%.
- In 2023, smishing attacks on fitness apps rose by 8%.
- In 2024, smishing scams impersonating utility companies increased by 10%.
- In 2021, smishing attacks exploiting urgency tactics rose by 25%.
- In 2022, smishing scams targeting event tickets increased by 10%.
- In 2023, smishing attacks on dating apps rose by 8%.
- In 2024, smishing scams impersonating healthcare providers increased by 12%.
- In 2021, smishing attacks during Cyber Monday rose by 15%.
- In 2022, smishing scams targeting rental services increased by 10%.
- In 2023, smishing attacks on food delivery apps rose by 8%.
- In 2024, smishing scams impersonating retailers increased by 15%.
- In 2021, smishing attacks exploiting fake invoices rose by 10%.
- In 2022, smishing scams targeting car dealerships increased by 8%.
- In 2023, smishing attacks on real estate platforms rose by 10%.
- In 2024, smishing scams impersonating travel booking sites increased by 12%.
- In 2021, smishing attacks using fake job offers rose by 15%.
- In 2022, smishing scams targeting hotel bookings increased by 10%.
- In 2023, smishing attacks on ride-sharing apps rose by 8%.
- In 2024, smishing scams impersonating tax agencies increased by 15%.
- In 2021, smishing attacks exploiting fake surveys rose by 10%.
- In 2022, smishing scams targeting online banking rose by 15%.
- In 2023, smishing attacks on nonprofit organizations rose by 8%.
- In 2024, smishing scams impersonating social media platforms increased by 12%.
How to Protect Yourself from Smishing Attacks
Protecting oneself from smishing attacks is not just about being cautious; it's about being informed and proactive.
Here are some important tips to consider:
- Stay Informed: Knowledge is your first line of defense. Regularly educate yourself about the latest smishing tactics and trends. Many organizations and cybersecurity firms publish updates and warnings about new smishing schemes. Also, conduct smishing simulations to help employees understand different smishing attack vectors, monitor their behaviors, and provide the best training for their specific behavior.
- Verify the Source: Always be skeptical of unsolicited messages, especially those that ask for personal or financial information. If you receive a message from a bank or any other institution, call the official number on their website (not the one provided in the text) to verify its authenticity.
- Avoid Clicking on Suspicious Links: Cybercriminals often use shortened URLs to hide the actual web address in smishing texts. Before clicking on any link, hover over it to see the full URL. If it looks suspicious, do not click.
- Use Two-Factor Authentication (2FA): While SMS-based 2FA has vulnerabilities, using app-based 2FA or hardware security keys can add an extra layer of security to your accounts.
- Install Antivirus Apps: Just as computers need antivirus software, so do mobile devices. Several reputable antivirus apps are designed for mobile devices, offering protection against malware, phishing sites, and other threats.
- Regularly Update Your Device: Ensure your mobile device's operating system and apps are always updated. Manufacturers and app developers frequently release security patches to fix vulnerabilities.
- Be Wary of Caller ID Spoofing: Scammers can make it appear like they're calling or texting from a trusted organization. Remember that caller ID can be spoofed, so always verify the sender's identity.
- Report Suspicious Messages: If you receive a smishing text, report it to your telecom provider. In the US, for instance, you can forward the text to 7726 (SPAM). Reporting helps telecom companies track and block these malicious numbers.
Keepnet Smishing Simulator
In the fight against smishing, proactive measures are as significant as reactive ones. This is where Keepnet Smishing Simulator comes into play, offering a comprehensive solution to tackle smishing threats effectively. The platform is designed to address several key areas:
- Amplified Threat Awareness: Keepnet's Smishing Simulator uses real-world scenarios to train employees across various locations in detecting smishing threats. This hands-on approach ensures that staff are not just theoretically informed but practically prepared to identify and respond to smishing attempts.
- Streamlined Reporting: One of the most significant challenges in combating smishing is the lack of a streamlined reporting mechanism. Keepnet's security awareness training educates staff about the nuances of smishing threats and provides a unified platform for reporting suspicious activities. This is particularly beneficial for large organizations like hotel chains, where a centralized reporting system is important.
- Minimized Human Error: Human error is often the weakest link in cybersecurity. By exposing employees to simulated smishing attacks, Keepnet helps reduce the error margin. The simulations are designed to mimic real-world scenarios, making the training as realistic as possible.
- Fostering Security Culture: Cybersecurity is not just an IT issue; it's an organizational one. Keepnet's regular cybersecurity training sessions aim to create a proactive security culture. Employees become active participants in the cybersecurity strategy, making the system more robust.
- Regulatory Compliance: With the increasing number of cybersecurity regulations, compliance has become a significant concern for organizations. Keepnet's frequent simulations ensure the organization adheres to various cybersecurity regulations, thereby minimizing legal risks.
- Efficient Risk Management: Managing human risk is complex, especially for organizations across multiple locations. Keepnet's platform provides a centralized system for managing this risk, offering real-time monitoring and feedback. This ensures continuous improvement and helps in identifying potential areas of concern.
- Real-time Monitoring: The Smishing Simulator doesn't just stop at training; it goes further by tracking employee behavior during simulations. This real-time monitoring helps identify weaknesses and determine training needs across all locations. The collected data is invaluable for refining future training programs and enhancing the organization's cybersecurity posture.
Next Steps
Don't leave your organization's security to chance. Equip your team with the smishing awareness training to combat smishing threats effectively.
Also, watch our YouTube video to discover how our smishing simulator offers robust protection against SMS phishing threats. This tool not only educates but also empowers you to recognize and respond to smishing attempts proactively. Learn the functionalities and benefits of our simulator, designed to enhance your cybersecurity defenses in a practical, engaging way.
Editor's note: This blog post was updated on September 8th, 2025