Ask the Expert

Does SMS spoofing require as much effort as email spoofing?

Why is it easier to fake the sender of an email message than to fake the sender of a message that uses the SMS protocol?

    Requires Free Membership to View

Spoofing an email message sender is trivial. The Simple Mail Transfer Protocol (SMTP) does not include verification of source email addresses. Thus, an attacker can simply telnet to a mail server's TCP port 25 and type in a message using any source address that he or she wants. Most mail servers will dutifully deliver the mail.

Some mail servers do a check with forward and reverse DNS lookups, verifying that the source email address appears to be coming from a mail server in that environment. If a message from ed@bogussourcename.com doesn't have a DNS record, and forward and reverse lookups can't match bogussourcename.com with a proper IP address, then the message might be spoofed. Unfortunately, such checks are often inaccurate, and that's why a lot of servers don't perform them.

Short Message Service (SMS) spoofing is more complex, but far from impossible. The various SMS message providers -- typically cell phone service providers -- have integrated their SMS messaging with the Internet, allowing users to send messages by surfing to a Web site and simply typing one in (the user is also allowed to enter a source email address and phone number). Some SMS providers check these numbers to make sure they are accurate, but others do not.

Also, there are flaws in these SMS message-sending Web applications that can easily be exploited to bypass any attempt at verification. In fact, there are both free and commercial software applications available that will generate enormous numbers of spoofed SMS messages. So, SMS spoofing requires a little more technical savvy, but even that technical know-how has been embedded in easy-to-use, Web-based software.

More information:

  • It's not just SMS text messaging spam that's heading to your mobile devices. See what other mobile malware is on the way.
  • Learn how to defend mobile devices from viruses and spyware.
  • This was first published in July 2007

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: