In 2023, the FBI's IC3 reported over $5.6 billion in losses from phishing and its variants — and smishing, the SMS-based cousin, drove a massive chunk of that number. I've watched smishing evolve from clumsy "you won a prize" texts into sophisticated, multi-step social engineering campaigns that fool seasoned professionals. If you think your team can spot a fake text, the smishing attack examples I'm about to walk through will make you reconsider.
This post breaks down real-world smishing campaigns, dissects why they work, and gives you the patterns to train your organization against them.
What Is Smishing — And Why It's Exploding in 2026
Smishing is phishing delivered via SMS or messaging apps. The threat actor sends a text designed to trick the recipient into clicking a malicious link, handing over credentials, or installing malware. That's the simple version.
The reality is messier. Modern smishing campaigns use spoofed sender IDs, URL shorteners, and real brand names to bypass your instinct to question the message. According to the FBI IC3 Annual Report, phishing — including smishing and vishing — has been the top reported cybercrime category for years running.
Why SMS? Because text messages have a 98% open rate. Emails sit in inboxes. Texts get read within minutes. Threat actors know this, and they've shifted resources accordingly.
5 Smishing Attack Examples Pulled From the Real World
Let me walk you through actual smishing attack examples that caused real damage. These aren't hypothetical. They're patterns I've seen repeated across industries.
1. The Fake Package Delivery Notification
You've seen this one. A text claims to be from USPS, FedEx, or UPS: "Your package cannot be delivered. Update your address here." The link leads to a credential theft page that clones the carrier's site pixel-for-pixel.
In 2021, USPS-themed smishing was so prevalent that the Postal Inspection Service issued a public warning. The campaigns harvested names, addresses, and credit card numbers from millions of victims. These attacks persist in 2026 because the template works — everyone orders packages.
2. The Bank Fraud Alert
"ALERT: Unusual activity detected on your account ending in 4821. Verify now or your account will be locked." This message creates panic. The victim clicks the link, enters their banking credentials on a spoofed login page, and the attacker drains the account — sometimes within minutes.
I've investigated cases where threat actors paired this smishing text with a follow-up phone call (vishing) to extract multi-factor authentication codes in real time. It's a one-two punch that defeats MFA if your employees don't know the playbook.
3. The IRS or Tax Agency Scam
Every tax season, the IRS warns about smishing campaigns impersonating the agency. Texts claim you owe back taxes or that a refund is waiting — but only if you click the link and "verify your identity." The IRS has been explicit: they do not initiate contact via text message. Ever.
These campaigns target individuals, but they also target payroll and HR departments. A smishing text impersonating a tax authority can trick an employee into uploading W-2 data for an entire organization.
4. The CEO or Executive Impersonation Text
This one targets your employees directly. The text appears to come from the CEO or CFO: "Hey, I'm in a meeting and can't talk. I need you to purchase gift cards for a client event. I'll reimburse you. Can you handle this now?"
It sounds absurd until you realize it works constantly. The FBI has tracked business email compromise (BEC) losses exceeding $2.9 billion in a single year, and the SMS variant exploits the same psychology — authority, urgency, and the desire to be helpful.
5. The Toll Road or Parking Fine Scam
Starting in late 2024 and surging into 2026, CISA flagged a wave of smishing campaigns impersonating toll agencies and parking authorities. "You have an unpaid toll of $6.99. Pay within 24 hours to avoid a $50 late fee." The low dollar amount makes victims think it's not worth questioning. They click, enter payment info, and the attacker captures the card.
This campaign was effective because the amounts were small and plausible. Nobody thinks they're being scammed over $6.99.
Why These Smishing Attack Examples Keep Working
Every one of these smishing attack examples exploits the same psychological triggers. Understanding those triggers is the first step toward building real security awareness across your team.
Urgency Shuts Down Critical Thinking
"Act now or your account will be locked." "Pay within 24 hours." "I need this handled before my meeting ends." Every smishing text manufactures a deadline because rushed people make mistakes.
Authority Overrides Skepticism
Messages from the IRS, your bank, your CEO — these carry weight. Employees are conditioned to respond to authority figures. Threat actors exploit that conditioning ruthlessly.
Context Creates Believability
If you just ordered a package, a delivery notification text feels real. If it's April, an IRS text feels plausible. Attackers time these campaigns to align with events that make the message credible.
How Do You Identify a Smishing Text?
Here's a quick checklist your team can use immediately:
- Unknown or spoofed number: The sender isn't in your contacts, or the number looks like a random string.
- Shortened or suspicious URL: Legitimate organizations typically use their own domains, not bit.ly links or misspelled URLs.
- Urgency or threats: Any message that demands immediate action is a red flag.
- Request for credentials or payment: No legitimate organization asks for passwords, PINs, or payment via text.
- Too good or too bad to be true: A surprise refund or a sudden fine — both are bait.
When in doubt, contact the organization directly using a number from their official website. Never use the number or link in the text itself.
The $4.88M Lesson: Why Training Beats Technology
IBM's Cost of a Data Breach Report pegged the global average cost of a breach at $4.88 million in 2024. The leading initial attack vector? Social engineering — which includes smishing.
Spam filters and mobile security tools help, but they don't catch everything. Attackers constantly rotate domains, phone numbers, and messaging platforms to evade detection. The last line of defense is always the human reading the text.
That's why phishing simulation and ongoing training aren't optional. They're the only way to build the kind of reflexive skepticism that stops a smishing text from becoming a data breach.
If you're looking to build that muscle in your workforce, our phishing awareness training for organizations includes SMS-based scenarios modeled on the exact smishing attack examples in this post. It puts your employees in realistic situations before a real threat actor does.
Building a Smishing-Resistant Organization
Technical controls matter. Deploy them. But also do this:
- Run phishing simulations that include SMS: Most organizations only simulate email phishing. That leaves a massive blind spot.
- Implement zero trust principles: Never trust a request just because it appears to come from an internal source. Verify through a separate channel.
- Require MFA — and train employees to never share codes: Multi-factor authentication is powerful, but only if your team understands that no one legitimate will ever ask for their code via text.
- Create a reporting culture: Make it easy and safe for employees to flag suspicious texts. The faster you identify a campaign, the faster you shut it down.
- Train continuously, not annually: A once-a-year compliance video doesn't build reflexes. Ongoing cybersecurity awareness training keeps the threat top of mind.
Smishing Isn't Going Away — Your Preparation Has To Evolve
I've watched smishing go from a nuisance to a primary attack vector in under five years. The campaigns are getting better. AI-generated text makes messages more grammatically polished and contextually accurate. Threat actors are buying leaked data to personalize texts with your name, your bank, and your recent purchases.
The smishing attack examples I've shared here aren't edge cases. They're the norm. Your employees will receive texts like these — probably this week. The only question is whether they'll recognize the attack or fall for it.
Start with awareness. Make it specific. Make it ongoing. And make it realistic — because the attackers certainly are.