{"id":53810,"date":"2025-07-11T11:09:54","date_gmt":"2025-07-11T15:09:54","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53810"},"modified":"2025-07-11T11:09:54","modified_gmt":"2025-07-11T15:09:54","slug":"what-are-sms-blasters-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/53810\/","title":{"rendered":"How to protect yourself from SMS blaster scams"},"content":{"rendered":"<p>Fake text messages pretending to be from banks, delivery services, or municipal agencies are scammers\u2019 tactic of choice to trick people into revealing financial information and passwords. This type of phishing is often referred to as \u201csmishing\u201d (from \u201cSMS phishing\u201d). While nearly every carrier filters dangerous text messages, and only a fraction reach recipients, scammers have come up with something new. Over the past year, criminals have been arrested in the <a href=\"https:\/\/www.theguardian.com\/money\/2025\/jun\/24\/police-sms-scams-blaster-texts-smishing\" target=\"_blank\" rel=\"nofollow noopener\">UK<\/a>, <a href=\"https:\/\/commsrisk.com\/bangkok-police-arrest-hong-kong-smishing-scammers-carrying-an-imsi-catcher-backpack-through-shopping-malls\/\" target=\"_blank\" rel=\"nofollow noopener\">Thailand<\/a>, and <a href=\"https:\/\/www.1news.co.nz\/2024\/10\/03\/sms-blaster-found-for-first-time-in-nz-alleged-scammer-arrested\/\" target=\"_blank\" rel=\"nofollow noopener\">New Zealand<\/a> for sending messages that bypassed carrier networks and went directly to victims\u2019 phones. This technology is known as \u201cSMS blasting\u201d.<\/p>\n<h2>What is an SMS blaster?<\/h2>\n<p>An SMS blaster pretends to be a cellular base station. About the size of an old computer tower, it bristles with antennas. Scammers often stash it in the trunk of a car or even in a backpack. Once activated, the blaster prompts all nearby phones to connect to it, as it appears to be the most powerful base station with the best signal. When a phone connects, it receives a fake SMS. Depending on the blaster model and reception conditions, the SMS broadcast range is between around 500 and 2000 meters. This is why criminals prefer to operate in crowded areas like shopping malls, or tourist and business centers: these are where all known attacks have been recorded. What\u2019s more, the tech the scammers use provides them with all sorts of tricks: they don\u2019t pay for the messages, they can spoof any sender, and they\u2019re free to include any links at all; they don\u2019t even need to know victims\u2019 phone numbers: any phone will receive a message if it connects to the fake cell tower.<\/p>\n<h2>How an SMS blaster works<\/h2>\n<p>An SMS blaster exploits vulnerabilities in the 2G (GSM) communication standard. While 2G is primarily used today in remote, sparsely populated areas, all phones still support it. First, the blaster sends a technical signal over modern 4G\/5G networks. When any phone or smartphone receives this signal, it attempts to switch to a 2G network. Simultaneously, the blaster broadcasts fake 2G base-station signals. The victim\u2019s smartphone recognizes these as legitimate carrier signals and connects. Unlike the 3G, 4G, and 5G standards \u2013 where the smartphone and base station always perform a mutual cryptographic check during connection \u2013 this feature was only optional in 2G. This loophole allows an SMS blaster to mimic any carrier. Once connected, it can send any text message to a smartphone. After transmitting the SMS, the fake base station disconnects, and the smartphone reverts to its normal 4G\/5G network with its legitimate carrier.<\/p>\n<p>Perhaps surprisingly, this technology isn\u2019t new. Similar to blasters, devices known as <a href=\"https:\/\/sls.eff.org\/technologies\/cell-site-simulators-imsi-catchers\" target=\"_blank\" rel=\"nofollow noopener\">IMSI catchers<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stingray_phone_tracker\" target=\"_blank\" rel=\"nofollow noopener\">StingRays<\/a>, or cell site simulators, have been used by law enforcement and intelligence agencies to gather data on individuals attending events of interest. However, criminals have found a new use for the technology.<\/p>\n<h2>Defending against SMS blasters<\/h2>\n<p>You can block fake text messages by disabling 2G network connectivity on your smartphone, but that\u2019s a double-edged sword. If you live in an area with poor signal or far from major cities, your phone might still occasionally use 2G. This is why many carriers haven\u2019t completely phased out the outdated technology.<\/p>\n<p>If you haven\u2019t seen the 2G icon (an \u201cE\u201d or \u201cG\u201d next to your signal-strength indicator) in years, you might want to consider this option. Android phones running version 12 or newer offer the ability to <a href=\"https:\/\/security.googleblog.com\/2024\/08\/keeping-your-android-device-safe-from.html\" target=\"_blank\" rel=\"nofollow noopener\">disable 2G<\/a>, but not every vendor makes this toggle visible and accessible. Android 16 <a href=\"https:\/\/www.androidauthority.com\/android-16-mobile-network-security-3571497\/\" target=\"_blank\" rel=\"nofollow noopener\">introduced notifications<\/a> that alert you if your smartphone might be connected to a fake 2G tower, but due to hardware limitations these only work on certain newer smartphones.<\/p>\n<p>There\u2019s no similar option in iOS, but you can effectively disable 2G by activating Lockdown Mode. Unfortunately, this does far more than just turn off 2G; it significantly <a href=\"https:\/\/www.kaspersky.com\/blog\/apple-lockdown-mode\/45061\/\" target=\"_blank\" rel=\"noopener nofollow\">restricts many iPhone functions<\/a> in the name of maximum security (many would say it renders an iPhone practically unusable).<\/p>\n<p>To avoid sacrificing your phone\u2019s functionality while still protecting yourself from dangerous text messages, consider using a <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive smartphone security system<\/a>. SMS blasts will still be delivered to your phone, but they won\u2019t cause harm thanks to two layers of protection. The system identifies malicious messages regardless of the cellular network and blocks SMS spam (only on Android devices), while phishing protection prevents you from navigating to dangerous websites (on all smartphones).<\/p>\n<p>Beyond technical measures, vigilance and general precautions are crucial in combating fake text messages. Instead of tapping links, sign in to your banking app or delivery service website directly from your bookmarks, your smartphone\u2019s home screen, or by manually typing the address into your browser.<\/p>\n<blockquote><p>What other tricks do scammers use to try and sneak into your smartphone?<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/53497\/\" target=\"_blank\" rel=\"noopener nofollow\">Data theft during smartphone charging<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/\" target=\"_blank\" rel=\"noopener nofollow\">Trojan embedded in fake Android smartphones<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/samsung-exynos-vulnerabilities\/47586\/\" target=\"_blank\" rel=\"noopener nofollow\">Remote hacking of Samsung, Google and Vivo smartphones: the problem and the solution<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/disable-mobile-app-ad-tracking\/53096\/\" target=\"_blank\" rel=\"noopener nofollow\">How smartphones build a dossier on you<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/smart-speaker-tv-smartphone-eavesdropping\/50236\/\" target=\"_blank\" rel=\"noopener nofollow\">Are your TV, smartphone, and smart speakers eavesdropping on you?<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit \u201cSMS blasting\u201d work, why does it matter for travelers, and how to stay safe. <\/p>\n","protected":false},"author":2722,"featured_media":53811,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,1250,607,76,43,46,422,131],"class_list":{"0":"post-53810","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-ios","10":"tag-messengers","11":"tag-phishing","12":"tag-privacy","13":"tag-sms","14":"tag-threats","15":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/53810\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/29102\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/24308\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/29166\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/28305\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/31141\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/29817\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/40076\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/13539\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/32415\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-are-sms-blasters-and-how-to-protect-yourself\/29364\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/35085\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/34728\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/sms\/","name":"sms"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53810"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53810\/revisions"}],"predecessor-version":[{"id":53814,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53810\/revisions\/53814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53811"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}