Computer Crime Research Center

You are about to join the

Discussion : SMS spoofing - Q&A with CCRC staff

Discussion is closed !

1-15> 16-30 > Total 16 comments


2010-05-18 21:28:46 -
Is it possible to spoof date and time? I mean, is it possible to change the actual date and time in order to send a message to your cell phone as if it were sent the last year? for example.


2010-02-11 12:34:01 -
Where is my money


2009-06-23 09:39:24 -
I myself received a spoof SMS and was completely convinced. As far as I know they used hoaxMail (http://www.hoaxmail.co.uk) - they say that it should only be used for jokes but I'm sure it could be easily abused...


2009-03-13 17:53:51 -
ronnald your retarded


2009-02-25 08:17:52 -
i have to prepare a seminar on sms spoofing.but i am not able to understand the exact thecnicality involved behind the process.can someone please help me????


2008-11-08 11:30:14 -
i am curious how to spoof a text in the united states and have it provide the alternate number istead of a code is there a site that works well for the us i am in washington state


2008-10-18 02:47:43 -
i want to send spoofed sms, can you list all the web-site where i can send spoofed sms


2008-09-19 04:30:37 -
The GSM Association has identified a number of potential fraud attacks on mobile operators that are caused by abuse of SMS messaging services. The most serious of these threats is SMS Spoofing. SMS Spoofing occurs when a fraudster manipulates address information in order to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Frequently, these messages are addressed to destinations outside the home network – with the home SMSC essentially being “hijacked” to send messages into other networks.

The impact of this fraud is threefold:

1. The home network can incur termination charges caused by the delivery of these messages to interconnect partners. This is a quantifiable revenue leakage.

2. These messages can be of concern to interconnect partners. Their customers may complain about being spammed, or the content of the messages may be politically sensitive. Interconnect partners may threaten to cut-off the home network unless a remedy is implemented. Home subscribers will be unable to send messages into these networks.

3. While fraudsters normally used spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. The risk therefore emerges, that genuine subscribers may be billed for roaming messages they did not send. If this situation occurs, the integrity of the home operator’s billing process may be compromised, with potentially huge impact on the brand. This is a major churn risk.

An SMS Spoofing attack is often first detected by an increase in the number of SMS errors encountered during a bill-run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to by-pass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services.

The only 100%-sure way of detecting and blocking spoofed messages is to screen incoming mobile originated messages to verify that the sender is a valid subscriber and that the message is coming from a valid and correct location. This can be implemented by adding an intelligent routing function to the network that can query originating subscriber details from the HLR before the message is submitted for delivery.
This kind of intelligent routing function is beyond the capabilities of legacy messaging infrastructure.

Openmind Networks’ Traffic Control next generation message router gives mobile operators the intelligence, flexibility, scalability and reliability needed to cope with the uncertainties, capacity requirements and technological demands of current and emerging messaging services. The system supports the in-flight capture and control of protocol messages in order to provide intelligent message handling and routing applications. The Protect module augments Traffic Control with some specific anti-fraud features, including the ability to detect and block occurrences of SMS Spoofing. Protect is used to screen incoming messages by checking message contents and parameters against known fraud criteria. It can also perform external queries, such as HLR look-ups, to validate incoming messages.

Traffic Control can be used both as a replacement to legacy SMSCs and as an intelligent router that can add value to existing networks via the introduction of fraud screening and service enhancements. When used to block spoofing in a legacy network, messages from out-roamers are first routed to Traffic Control and Protect where they are screened before being relayed to existing SMSCs.



More detail at: http://www.openmindnetworks.com/SMSSpoofing.asp


2008-07-11 01:15:46 -
I am getting texts messages all day from my own cell phone number. But the messages are harrassing from a admire who is not revealing his identity. The most frustrating thing about this is I can not respond to the messages because the displaying number is my own phone number. How is this possible and what can I do about this? The individual is always telling me about his day and how he wishes to be with me. At times I even think he is watching me. I heard about a SMS techology out, but I am not educated on it's capabilities. This harassement has gone on for about 2 months now and i'm frustrated.


2008-07-11 01:13:16 -
I am getting texts messages all day from my own cell phone number. But the messages are harrassing from a admire who is not revealing his identity. The most frustrating thing about this is I can not respond to the messages because the displaying number is my own phone number. How is this possible and what can I do about this? The individual is always telling me about his day and how he wishes to be with me. At times I even think he is watching me. I heard about a spoofing techology out, but I am not educated on it's capabilities. This harassement has gone on for about 2 months now and i'm frustrated.


2007-01-18 06:29:15 -
I myself received a spoof SMS and was completely convinced. As far as I know they used hoaxMail (http://www.hoaxmail.co.uk) - they say that it should only be used for jokes but I'm sure it could be easily abused...


2006-09-01 11:49:59 -
I think that any webite which advertises "spoof" texting should be should down. Unfortunately there are twisted people in this world who will abuse this facility in order to cause others harm, bullying, or general annoyance. I know of 2 cases where spoof text have been sent to the receiver in order to cause mis-trust within a marriage and a relationship. Although it could be used for a fun side, there is no doubt that brainless idiots will use this type of system purely for malicious intent. I would advise anyone not to sign up to these money making sites.


2005-06-29 11:39:43 -
@Andre: there's nothing positive about an unsolicited message. It's a waste of my time and a waste of money for whoever sent it. I don't buy anything that's advertised to me wihtout my concent. I mute the adverts on my TV, I empty the stupid leaflets I get with magazines into the bin, I delete spam on site, block it and report the sender. Nobody ever managed to get me to part with money for something I didn't need - especially not by sending me dumb messages to my phone!


2005-01-12 06:03:54 -
We can take spoofing in a positive way. We can use it for positive things like advertisements or in case of hospital emergency etc.The thing is we have to think in good manner to utilise this technology.


2004-11-17 00:24:06 - pujs
@ronald. before you write such a stupid post, you can at least read it again before clicking the publish button. spoofing is not PORN or something that a 12yr old souldn't hear about. it's illegal though. but so is murder and still you hear about it on the news. so shut ur piehole if you don't know what the subject is about. "your cooperation would be appreciated"


1-15> 16-30 >
Total 16 comments
Copyright © 2001-2013 Computer Crime Research Center
CCRC logo