This Content Component encountered an error
Why is it easier to fake the sender of an email message than to fake the sender of a message that uses the SMS protocol?
Spoofing an email message sender is trivial. The Simple Mail Transfer Protocol (SMTP) does not include verification of source email addresses. Thus, an attacker can simply telnet to a mail server's TCP port 25 and type in a message using any source address that he or she wants. Most mail servers will dutifully deliver the mail.

Some mail servers do a check with forward and reverse DNS lookups, verifying that the source email address appears to be coming from a mail server in that environment. If a message from ed@bogussourcename.com doesn't have a DNS record, and forward and reverse lookups can't match bogussourcename.com with a proper IP address, then the message might be spoofed. Unfortunately, such checks are often inaccurate, and that's why a lot of servers...

don't perform them.

Short Message Service (SMS) spoofing is more complex, but far from impossible. The various SMS message providers -- typically cell phone service providers -- have integrated their SMS messaging with the Internet, allowing users to send messages by surfing to a Web site and simply typing one in (the user is also allowed to enter a source email address and phone number). Some SMS providers check these numbers to make sure they are accurate, but others do not.

Also, there are flaws in these SMS message-sending Web applications that can easily be exploited to bypass any attempt at verification. In fact, there are both free and commercial software applications available that will generate enormous numbers of spoofed SMS messages. So, SMS spoofing requires a little more technical savvy, but even that technical know-how has been embedded in easy-to-use, Web-based software.

More information:

  • It's not just SMS text messaging spam that's heading to your mobile devices. See what other mobile malware is on the way.
  • Learn how to defend mobile devices from viruses and spyware.
  • This was first published in July 2007

    Dig deeper on Malware, Viruses, Trojans and Spyware

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close