Keepnet Labs Logo
Menu
HOME > blog > the most spoofed brands in sms phishing protect your business in 2025

The Most Spoofed Brands in SMS Phishing: Protect Your Business in 2025

SMS phishing scams are on the rise, with cybercriminals spoofing trusted brands like Amazon, Microsoft, and banks. This blog explores the most targeted brands in 2025 and strategies to protect your business using Keepnet’s tools and training.

The Most Spoofed Brands in SMS Phishing: Protect Your Business in 2025

Every day, over 3.5 billion phone users receive spam text messages, many of which impersonate trusted brands like Amazon, Microsoft, or major banks. These SMS phishing (smishing) scams exploit the trust people place in familiar names to steal sensitive information.

The impact of these attacks is alarming. Victims often face financial losses, stolen identities, and exposure to confidential business data. In smishing attacks, the median loss reported by victims was $1,000 in 2022. Cybercriminals craft convincing messages, such as fake delivery updates or urgent account alerts, to trick users into clicking malicious links or providing personal details.

This blog will uncover the most commonly spoofed brands in SMS phishing attacks, explain why these brands are targeted, and provide steps businesses can take to protect themselves from these growing threats.

What is SMS Phishing (Smishing)?

Smishing is a type of phishing scam delivered through SMS messages. These messages often impersonate trusted brands, misleading recipients into clicking malicious links or sharing sensitive information like passwords or financial details.

Why is SMS such a common method for attackers? It has a 90% open rate, with most messages being read within the first three minutes. This immediacy creates a sense of urgency, making recipients more likely to respond without verifying the message's authenticity.

To learn more about how smishing operates, check out our guide on what smishing is and how to protect yourself against it.

Why Cybercriminals Target Specific Brands for SMS Phishing Attacks

Cybercriminals don’t choose brands randomly. Their targets are strategic:

ReasonExplanationExamples
Trust and FamiliarityCybercriminals exploit the trust built by established brands over the years.Brands like Amazon, Apple, and Microsoft that users interact with regularly are common targets.
Massive User BasesPopular brands with millions of customers provide attackers with many potential victims.Companies like Google, Walmart, and PayPal cater to a global audience.
Common TacticsAttackers create realistic scenarios to trick users into providing sensitive information.Tactics include fake payment alerts, fraudulent order confirmations, and phony account login requests.

Table 1: Key Reasons Cybercriminals Target Specific Brands for SMS Phishing

The Most Spoofed Brands in SMS Phishing Attacks

Cybercriminals carefully select trusted brands for SMS phishing (smishing) campaigns to exploit their familiarity, credibility, and frequent interactions with users. These brands are not chosen at random—hackers target them because they are widely recognized, and people often receive legitimate messages from them. This increases the chances of a victim trusting and interacting with a fake message. Let’s break down the most impersonated brands, why they are targeted, and the tactics hackers use.

According to Keepnet, the following brands were the most impersonated in smishing attempts:

Amazon

Amazon leads the list with 38% of smishing attempts. The company’s massive global customer base and frequent transactional communications make it a prime target for cybercriminals. Hackers exploit legitimate-looking notifications, such as:

  • Order Confirmations: “Your order could not be processed. Click here to update your payment details.”
  • Shipping Updates: “Your package is delayed. Track it here.”

These messages prey on users' expectations of regular updates, making the fake links appear credible. Once clicked, victims are redirected to malicious websites that steal personal or payment information.

Amazon SMS Scam - Keepnet Smishing Scherio
Picture 1: Amazon SMS Scam - Keepnet Smishing Scherio

Apple

Apple accounts for 17% of smishing attacks, reflecting its strong association with user accounts, passwords, and financial data. Apple’s ecosystem, including iCloud, Apple Pay, and App Store, stores sensitive personal details, making it a lucrative target for hackers. Common smishing tactics include:

  • Fake Account Alerts: “Your Apple ID has been locked due to suspicious activity. Verify here.”
  • Password Reset Requests: “We’ve detected an unauthorized login. Reset your password now.”

These messages direct users to convincing phishing sites mimicking Apple’s secure login pages, where credentials are harvested.

Apple SMS Scam - Keepnet Smishing Scenario
Picture 2: Apple SMS Scam - Keepnet Smishing Scenario

HMRC (UK Tax Authority):

HMRC is impersonated in 15% of smishing attempts, making it one of the most spoofed government entities. Hackers rely on the fear and urgency associated with tax-related communications to manipulate victims. Common smishing schemes include:

  • Refund Notifications: “You are eligible for a £500 tax refund. Claim it here.”
  • Payment Warnings: “Your tax payment is overdue. Pay now to avoid penalties.”

The sense of urgency drives victims to click malicious links leading to fake payment portals designed to steal financial information or infect devices with malware.

HMRC SMS Scam - Keepnet Smishing Scenario
Picture 3: HMRC SMS Scam - Keepnet Smishing Scenario

PayPal

PayPal is targeted in 12% of smishing attempts due to its role in facilitating online payments and storing sensitive financial details. Hackers exploit the high volume of legitimate account alerts PayPal users receive. Typical smishing messages include:

  • Transaction Alerts: “Unusual activity detected. Confirm this transaction here.”
  • Account Verification Requests: “Your account has been restricted. Verify your identity now.”

These messages often direct recipients to fake PayPal login pages where hackers steal credentials and gain access to their accounts.

PayPal SMS Scam - Keepnet Smishing Scenario
Picture 4: PayPal SMS Scam - Keepnet Smishing Scenario

USPS

With 11% of smishing attacks, USPS scams are especially effective due to the high volume of e-commerce and package deliveries. Hackers exploit users’ reliance on tracking updates and delivery notifications by sending messages like:

  • Delivery Issues: “Your package could not be delivered. Update your address here.”
  • Shipping Fee Notices: “Additional postage is required to release your package. Pay here.”

The fraudulent links redirect victims to phishing sites that steal payment information or personal details.

USPS SMS Scam - Keepnet Smishing Scenario
Picture 5: USPS SMS Scam - Keepnet Smishing Scenario

FedEx

FedEx-related smishing makes up 7% of attacks, often targeting users during peak shipping seasons like holidays. These scams mimic FedEx’s legitimate delivery notifications to trick recipients into clicking malicious links. Common examples include:

  • Tracking Updates: “Your package is out for delivery. Track it here.”
  • Undelivered Packages: “We couldn’t deliver your package. Confirm your address now.”

Hackers leverage the widespread use of FedEx for online shopping deliveries, creating urgency to engage with the scam.

FEDEX SMS Scam - Keepnet Smishing Scenario
Picture 6: FEDEX SMS Scam - Keepnet Smishing Scenario

Netflix

Netflix is targeted in 5% of smishing campaigns. Hackers exploit the platform’s subscription-based model, where disruptions to account access or payment processing can cause immediate concern. Smishing messages typically include:

  • Payment Issues: “Your subscription payment failed. Update your billing information now.”
  • Account Suspension: “Your account has been suspended. Reactivate it here.”

Victims are led to fraudulent login or payment pages where hackers steal credentials or financial data. See our smishing statistics research to learn more about smishing facts and trends.

Netflix SMS Scam- Keepnet Smishing Scenario
Picture 7: Netflix SMS Scam- Keepnet Smishing Scenario

Why Hackers Target These Brands in Smishing Attacks

Hackers target these brands in smishing attacks because they exploit specific characteristics that make their scams convincing and effective:

1. Global Trust and Familiarity

Brands like Amazon, Apple, and Netflix are globally recognized and widely trusted. Users are less likely to question messages from these companies, assuming they are legitimate because of their reputation.

2. Frequent and Expected SMS Communication

Brands such as Amazon, FedEx, and USPS often send legitimate SMS notifications for orders, deliveries, or account updates. Hackers exploit this by mimicking real messages, making fake ones appear normal and trustworthy.

3. Access to Sensitive Financial Information

Brands like PayPal and Apple are closely tied to payments and personal data. Smishing messages often claim issues like unauthorized transactions or account suspension, prompting users to share login details or financial information.

4. Creating a Sense of Urgency or Fear

Hackers use urgency to pressure victims. Messages like “Your tax refund is waiting” (HMRC) or “Your package is undeliverable” (FedEx, USPS) push users to act quickly without questioning the message’s authenticity.

By leveraging trust, routine interactions, and emotional triggers, these smishing campaigns become highly persuasive, leading to higher success rates for hackers.

Real-World Consequences of Spoofing in SMS Phishing

In August 2022, Twilio, a company providing SMS services, was targeted in a smishing attack using brand spoofing. Cybercriminals posed as Okta, a trusted IT provider, and sent fake text messages to Twilio employees.

The messages claimed their sessions had expired and included a link to a fake login page that looked exactly like Okta’s real site. At least one employee entered their credentials, giving the attackers access to sensitive customer data, including addresses, payment details, and email information.

The breach went unnoticed for four days, allowing attackers to steal a large amount of data. Twilio later worked with mobile providers to block the malicious links. This attack shows how brand spoofing can trick even tech-savvy organizations.

Learn how to prevent spoofing attacks on our blog post: Understanding and Preventing Spoofing in Cybersecurity

How to Protect Your Organization Against SMS Phishing Attacks

Defending against SMS phishing requires a combination of employee awareness, practical testing, and secure communication practices. Here’s how your organization can stay protected:

1. Employee Training

Train employees to recognize and respond to smishing attempts. Use tools like Security Awareness Training to educate staff on spotting fake messages, malicious links, and impersonation tactics. Regular training builds a vigilant and informed workforce.

2. Simulation Tools

Evaluate your organization’s readiness with realistic phishing tests. Tools like the Phishing Simulator and Smishing Simulator allow you to replicate real-world attacks and identify vulnerabilities in employee responses.

3. Secure Practices for Consumers and Employees

  • Always verify suspicious messages by contacting the brand or service provider directly through official channels.
  • Avoid clicking on unverified links or providing sensitive information, such as login credentials or financial details, via SMS.
  • Report smishing attempts to your IT department or security team to take immediate action.

To learn more about how to secure your business against Smishing statistics.

Minimize Smishing Risks with the Keepnet Human Risk Management Platform

The Keepnet Human Risk Management Platform provides organizations with advanced tools to effectively combat smishing and brand spoofing, equipping teams with the skills and insights needed to mitigate risks.

1.Security Awareness Training

Educate employees to recognize and respond to smishing attacks through Security Awareness Training. This module delivers real-world lessons on identifying fraudulent messages, especially those leveraging spoofed brands.

2. Comprehensive Monthly Training Plan

Keepnet’s structured training calendar provides a targeted approach to addressing key security risks throughout the year. Each month is dedicated to a specific risk, combining phishing simulations with contextual education to enhance understanding and vigilance.

For example:

  • January focuses on information security basics, using sensitive information campaigns to educate employees on safeguarding critical data.
  • June tackles malware threats with an online security campaign, teaching employees how to identify malicious software.

This proactive approach ensures employees stay ahead of potential threats, fostering a culture of security awareness.

Keepnet Training Program Sample for a Whole Year
Picture 8: Keepnet Training Program Sample for a Whole Year

3. Engaging Quarterly Awareness Activities

To ensure retention, Keepnet incorporates interactive learning tools into its quarterly plans. These tools—such as quizzes, posters, and simulations—are tailored to reinforce critical security behaviors.

For instance:

  • In January, employees participate in password security training using phishing and smishing simulations, complemented by quizzes and infographics.
  • By March, ransomware risks take center stage with interactive visuals and ransomware phishing scenarios to test employee readiness.

This multi-layered approach not only educates but also reinforces real-world application, making employees better prepared to handle threats.

Keepnet Annual Security Awareness Program
Picture 9: Keepnet Annual Security Awareness Program

4. Tailored Training Content for Every Organization

Keepnet’s flexibility sets it apart, offering organizations access to various training providers. This allows businesses to select the formats and styles that resonate most with their workforce, ensuring maximum engagement and learning outcomes.

Whether employees prefer gamified experiences or traditional formats, Keepnet enables organizations to deliver training that suits their unique culture.

5. Outcome-driven Metrics That Drive Results

One of the standout features of Keepnet’s solutions is their ability to provide outcome-driven metrics that reflect real improvements in security behavior and culture. These measurable results demonstrate the effectiveness of Keepnet’s programs in combating cyber threats. Key metrics include:

  • Phishing Risk Score: Reduce risky behaviors by up to 95%, creating a safer digital environment.
  • Click-Through Rate: Achieve a 92% reduction in phishing link clicks, lowering your exposure to threats.
  • Reporting Rate: Boost employee reporting of suspicious activity by 92%, enabling faster responses.
Keepnet provides outcome-driven metrics
Picture 10: Keepnet provides outcome-driven metrics

Organizations can visualize these results through Keepnet’s intuitive dashboards, which track engagement, training completion rates, and overall risk reduction. This transparency helps companies continually improve their security posture.

Additionally, Keepnet’s Human Risk Management Platform leverages the Protection Level Agreement (PLA) to guarantee that your security awareness program will achieve clear, measurable outcomes. The PLA sets specific goals, such as reducing the number of employees clicking on phishing links or increasing the rate of suspicious activity reports. By holding the program accountable to these benchmarks, the PLA ensures that your training efforts deliver real, impactful results, making your organization safer and more secure.

Check out Keepnet security awareness training for more information.

6. Smishing Simulator with Spoofed Brand Templates

The Smishing Simulator enables organizations to test employee responses using realistic templates based on commonly spoofed brands like Amazon, PayPal, and Apple. These scenarios improve employees' ability to detect and avoid smishing attacks. See example smishing templates you can use for security awareness training:

Keepnet Smishing Scenario - Amazon SMS Scam
Picture 11: Keepnet Smishing Scenario - Amazon SMS Scam

Keepnet Smishing Scenario - PayPal SMS Scam
Picture 12: Keepnet Smishing Scenario - PayPal SMS Scam

Keepnet Smishing Scenario - Apple SMS Scam
Picture 13: Keepnet Smishing Scenario - Apple SMS Scam

Unlike generic training programs, Keepnet’s Smishing Simulator allows organizations to replicate region-specific threats, such as fake tax refund alerts from HMRC in the UK or phishing scams targeting financial services in the US. These customized SMS phishing simulations enhance employee preparedness for real-world scenarios.

Read our step-by-step guide to learn how to create an SMS phishing simulation campaign.

Also, watch the video below to get more details about how to launch SMS phishing campaigns.

7. Human Risk Scoring and Reporting

Track employee behavior during smishing simulations with Human Risk Scoring, using outcome-driven metrics to identify vulnerabilities and improve smishing awareness training strategies.

Read our blog on Human Risk Scoring to learn more.

Keepnet’s SMS & Voice Phishing Simulations replicate real-world attacks, such as fake refund requests and discount scams, helping employees recognize and avoid smishing threats.

SMS & Voice Phishing Simulations
Picture 14: SMS & Voice Phishing Simulations

By focusing on specific vulnerabilities, Human Risk Scoring ensures:

  • Tailored training for employees prone to smishing threats.
  • Data-driven improvements in overall security posture.

Keepnet’s Human Risk Scoring empowers businesses to proactively reduce smishing risks and create a security-aware workforce.

This graphic highlights the human risk scores of users identified as the highest risk within your organization.
Picture 15: This graphic highlights the human risk scores of users identified as the highest risk within your organization.

8. Keepnet Advanced Reporting

Keepnet’s Advanced Reporting provides organizations with detailed, actionable insights into employee behavior during smishing simulations. Using Human Risk Scoring, it identifies high-risk employees and departments by analyzing metrics such as phishing link clicks, reporting rates, and training completion.

The interactive dashboards allow security teams to:

  • Visualize Vulnerabilities: Track risky behaviors and assess which teams or individuals need additional training.
  • Tailor Training Programs: Customize awareness strategies based on data to address specific weaknesses.
  • Measure Progress Over Time: Monitor improvements in phishing awareness and overall security posture.

For leadership, Executive Reports summarize key findings like high-risk users and departments, helping them make informed decisions to support strategic initiatives. These tools, combined with realistic smishing simulations, empower organizations to proactively mitigate risks and strengthen their defense against phishing threats.

A Sample of Keepnet Advanced Reporting
Picture 16: A Sample of Keepnet Advanced Reporting

9. Threat Intelligence Sharing

Stay informed about the latest phishing trends, including brand spoofing tactics, with Threat Sharing Platform. Use these insights to proactively enhance your organization's defenses.

Keepnet Threat Sharing Platform
Picture 17: Keepnet Threat Sharing Platform

For further details, read our blog on what Threat Intelligence Sharing is and learn how it can help you mitigate SMS Phishing risks.

Keepnet’s Threat Intelligence Sharing Platform keeps organizations informed about the latest phishing tactics, including smishing campaigns targeting top brands. This real-time intelligence helps businesses stay one step ahead of cybercriminals and reinforces their proactive defense strategies.

With the rise of smishing attacks targeting trusted brands, businesses need more than awareness—they need actionable tools and measurable results. Keepnet’s Human Risk Management Platform combines cutting-edge phishing simulations, advanced reporting, and AI-powered training to empower organizations against evolving threats.

SHARE ON

twitter
linkedin
facebook

Schedule your 30-minute demo now

You'll learn how to:
tickIdentify and respond to smishing attacks effectively.
tickTrain employees to recognize and avoid spoofed brand threats.
tickBenchmark your organization’s human risk resilience with outcome-driven metrics.