Skip to main content
Beware of SMS phishing
Shaun avatar
Written by Shaun
Updated over a year ago

What is SMS phishing?

As a customer of a financial institution, you often become a phishing target. It is important for you to be aware of this attack and take the necessary precautions.

Fraudsters, who pretend to be employees of Funding Societies | Modalku, might ask you to divulge sensitive information, such as your username and password. They might use this information to take over your account, apply for loans under your name, or withdraw your investments.

Fraudsters might also ask you to click a link to a website that looks similar to Funding Societies'. Customers, who are unaware that this website is actually owned by the fraudsters, might enter their username and password to login. Often, the website might also infect your device with malware.

Traditionally, email and phone calls have been used to carry out phishing attacks.

Recently, however, fraudsters have also used text messages, such as SMS, as well.

How to identify a phishing SMS?

Below are some ways to identify a phishing SMS - the SMS may ask you to:

  1. Provide sensitive information, primarily username and password.

  2. Click a link that leads to a website other than Funding Societies’ website.

  3. Contact a phone number other than Funding Societies’ phone numbers.

How to protect yourself against SMS phishing?

Below are several steps to protect yourself against SMS phishing:

  1. Verify whether the SMS you have received is really from Funding Societies. If you are unsure, contact us.

  2. Do not provide any sensitive information.

  3. Do not click any link in the SMS that leads to a website other than Funding Societies’ website.

  4. Do not contact a phone number other than Funding Societies’ phone numbers.

  5. Beware of SMSs that promise rewards or invoke fear.

How to report SMS phishing?

If you believe that you have received any phishing SMS, or have become a victim of a phishing SMS, please inform us immediately by contacting us via email at [email protected]

Did this answer your question?