In recent days, posts have circulated on social media claiming that Globe Telecom was hacked, following the spread of suspicious SMS messages. One such message reads:

“Hi there! Your number will be deactivated! Resubmit your SIM registry info by October 04, 2024 https://bit.ly/GLOBEG”

As alarming as this may sound, it is important to clarify that Globe Telecom was not hacked — based on my humble opinion. This message is a classic example of a phishing attempt, where scammers take advantage of an alphanumeric sender ID, making it appear as though the message came from Globe itself.

Phishing is a type of cyberattack in which criminals attempt to trick individuals into providing sensitive information such as passwords, credit card numbers, or personal identification details. Typically, these attacks involve fraudulent messages — often through email, SMS, or social media — that appear to come from a trusted source, like a bank, service provider, or well-known company. The message usually contains a link or attachment that, when clicked, directs the victim to a fake website or installs malicious software. Phishing relies on deception, exploiting human trust and urgency, making it a common and dangerous threat in today’s digital world.

Understanding Phishing Attempts

Phishing is a deceptive practice used by cybercriminals to obtain sensitive information, such as passwords, personal identification numbers (PINs), and other private data. These attackers often use various methods to disguise their malicious intent, and one common tactic is sending fake messages that appear to be from a legitimate entity. In this case, scammers are impersonating Globe, a trusted telecommunications provider, to trick users into clicking on a fraudulent link.

The message in question claims that the recipient’s number will be deactivated unless they resubmit their SIM registration information. This tactic taps into the public’s concern over SIM registration requirements, which have been heavily emphasized due to recent government regulations. By instilling fear of losing their mobile number, scammers hope to prompt users into taking immediate action.

The Role of A2P Messages in This Scam

One of the reasons why these messages seem convincing is that they use an A2P (Application-to-Person) message with an alphanumeric sender ID, a method that many legitimate companies, including Globe, often use. A2P messaging allows businesses to send SMS with a branded sender name instead of a phone number, improving brand recognition and trust.

However, while A2P messages are useful for businesses, they can also be exploited by cybercriminals to send deceptive messages that look legitimate. In this case, the phishing message falsely used Globe’s name as the sender, making it more believable to unsuspecting recipients.

Individuals can use A2P (Application-to-Person) messaging through various platforms to send automated messages to multiple recipients, leveraging it not just for business purposes like notifications and customer service, but also for personal activities such as organizing events, sending group reminders, or managing community alerts. For instance, someone planning a large event could use an A2P service to send invitations or schedule updates to guests efficiently. By using SMS gateway providers, individuals can integrate A2P messaging into their activities while maintaining a professional or personalized alphanumeric sender ID. Legitimate A2P message providers such as Twilio, Nexmo (Vonage), Plivo, MessageBird, and Clickatell offer secure platforms that comply with telecommunications regulations and data privacy laws. These companies provide robust APIs and user-friendly interfaces that facilitate easy communication, offering features like message tracking, delivery reports, and brand recognition through alphanumeric sender IDs. They play a critical role in enabling secure and efficient A2P communication for both businesses and individuals.

Illegally tapping into A2P messaging services involves exploiting vulnerabilities in SMS gateways or bypassing security measures to send unauthorized messages, often for phishing, spamming, or other fraudulent activities. Cybercriminals may gain access to these services by hacking poorly secured accounts, using stolen API keys, or manipulating weaknesses in the telecom infrastructure. Once in control, they can send mass messages impersonating legitimate businesses, tricking recipients into revealing sensitive information or installing malware. This illegal activity is a violation of laws governing telecommunications and data privacy, and it can lead to significant legal consequences for the perpetrators.

How to Recognize a Phishing Message?

To avoid falling victim to these scams, it’s important to know how to recognize a phishing message. Here are some key red flags:

  • Urgency or Threats: The message pressures you to act quickly by creating a sense of urgency, such as threatening to deactivate your mobile number.
  • Suspicious Links: Phishing messages often include shortened URLs or links that lead to fake websites designed to steal your personal information.
  • Request for Personal Information: Legitimate companies like Globe will never ask you to provide sensitive information through an SMS or email.
  • Errors in Message Content: Be on the lookout for poor grammar, unusual wording, or formatting issues in the message.

What You Should Do?

If you receive a suspicious SMS like the one circulating this week, do not click on the link. Instead:

  1. Verify with Globe: Visit the official Globe website or contact their customer service to confirm if any such action is required on your part.
  2. Report the Phishing Attempt: Report the message to Globe so they can investigate and take action to prevent further attempts.
  3. Stay Vigilant: Always be cautious of messages asking for personal information or urging immediate action.

Again, if you will ask me, Globe WAS NOT HACKED this week. The circulating messages are phishing attempts designed to steal your information, and the perpetrators took advantage of A2P messaging to make the message appear legitimate. Always be on the lookout for suspicious SMS, and remember to verify the authenticity of any communication before taking action.


ABOUT THE AUTHOR

Robert “Bob” Reyes is a technologist, an ICT Consultant and Tech Speaker, a certified Google IT Support Specialist, and an Open Source advocate representing the global non-profit Mozilla (makers of Firefox) in the Philippines. Bob is a Technology Columnist for the Manila Bulletin Publishing Corporation and an aviation subject matter expert contributor for Spot.PH.

Follow The Filipino Tech Explainer on Facebook and X/Twitter.

If you liked my articles or any of the contents or if The Filipino Tech Explainer has helped you in any way, you can buy me a coffee and share your thoughts. Help me continue producing awesome articles by supporting my website. Maraming salamat po! Thank you very much!

What’s your Reaction?
+1
0
+1
0
+1
0
+1
0
+1
0
+1
0
+1
0

Leave a Reply