Hacked.com icon

hacked.com

How to avoid SMS and text scams

text scam on phone sms

SMS scams work because texts feel routine. The attacker compresses pressure into a short message and tries to pull you into one of three outcomes: click a link, install an app, or share a one-time code. A strict verification habit stops most high-impact damage.

Simple rules that block most scamsDo thisWhy it works
LinksDo not click links in unexpected textsLinks are how scammers deliver phishing pages and malware
CodesNever share one-time codes with anyoneCode requests are account takeovers in progress
CallsDo not call numbers in texts; call the official number on your card or official siteBank and delivery impersonation relies on you dialing the attacker
PaymentsDo not pay fees from a text messagePayment pressure is a classic scam lever
VerificationVerify inside the official app or by typing the known domainIt breaks lookalike sites and URL shorteners

Do not: share verification codes with anyone. Codes are for logging in. If someone asks for one, assume account takeover is the goal.

The scam patterns that show up most often

ScamMessage patternSafe response
Verification-code theft“Read me the code to prove it’s you”Do not share it. Secure the account and rotate passwords
Delivery fee“Package held, pay a small fee”Track directly in the carrier or retailer app
Bank impersonation“Fraud alert, reply YES” then call a numberCall the number on your card or bank site, not the text
Wrong number baitFriendly mistake that becomes an investment pitchDo not engage. Block and report as spam
Account lockout“Your account will be closed today”Open the real app and check alerts there

What to do if you clicked a link

Most damage requires one more step after the click: entering credentials, installing an app, or sharing a code. Your goal is to stop the chain.

  • If you entered a password, change it from a clean device and enable 2FA.
  • Secure the email inbox that can reset that account. Email is the control plane.
  • Review active sessions and connected apps and revoke anything unfamiliar.
  • If you installed an app or the phone is behaving oddly, treat it as a device compromise: how to detect spyware.

If you suspect broader compromise, start with immediate steps after being hacked and how to check if you have been hacked.

Common mistake: changing passwords on the same device that installed a malicious app. If the device is compromised, the attacker can steal the new session.

Verification habits that scale

You do not need to memorize every scam. A few habits catch most of them.

  • Keep payments and logins out of the message thread. Navigate to services directly.
  • Assume any request for a one-time code is hostile.
  • Assume urgent messages are attempts to bypass verification.
  • Use a password manager so you do not reuse passwords across accounts.

Reduce SIM swap and phone-number attack risk

Some SMS scams are really phone-number attacks in disguise. If your number is a recovery method for important accounts, keep it stable.

  • If you lose service unexpectedly, treat it as possible SIM swapping and contact the carrier using official numbers.
  • Prefer authenticator apps, passkeys, or security keys over SMS when services support them.

Reporting (US)

If the text message is tied to fraud, reporting can help. Keep screenshots and the phone number, but do not keep interacting with the scammer.

Text scams become less effective when accounts are protected with strong authentication and when you keep payment decisions out of the message thread. The stable endpoint is simple: no links clicked, no codes shared, and verification done inside trusted apps and official sites. Once those rules are habitual, most SMS scams fail immediately because they cannot convert a message into access or money.