{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:54:54Z","timestamp":1763740494537,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":125,"publisher":"ACM","funder":[{"name":"MICIU&#x5c;&#x2f;AEI","award":["10.13039&#x5c;&#x2f;501100011033"],"award-info":[{"award-number":["10.13039&#x5c;&#x2f;501100011033"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"DOI":"10.1145\/3730567.3764431","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:22:38Z","timestamp":1763738558000},"page":"223-241","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fishing for Smishing: Understanding SMS Phishing Infrastructure and Strategies by Mining Public User Reports"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6492-5390","authenticated-orcid":false,"given":"Sharad","family":"Agarwal","sequence":"first","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8719-719X","authenticated-orcid":false,"given":"Antonis","family":"Papasavva","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-2553","authenticated-orcid":false,"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[{"name":"IMDEA Networks, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4045-9493","authenticated-orcid":false,"given":"Marie","family":"Vasek","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Josh Aas. 2015. The CA's Role in Fighting Phishing and Malware. https:\/\/letsencrypt.org\/2015\/10\/29\/phishing-and-malware.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Josh Aas. 2019. Let's Encrypt No Longer Checking Google Safe Browsing. https:\/\/community.letsencrypt.org\/t\/let-s-encrypt-no-longer-checking-google-safe-browsing\/82168."},{"key":"e_1_3_2_1_3_1","unstructured":"ACCC. 2010. Spam SMS: Report it! https:\/\/www.scamwatch.gov.au\/about-us\/news-and-alerts\/spam-sms-report-it."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer Nature Switzerland, Cham, 363-372","author":"Agarwal Sharad","year":"2023","unstructured":"Sharad Agarwal, Gilberto Atondo-Siu, Marilyne Ordekian, Alice Hutchings, Enrico Mariconti, and Marie Vasek. 2023. Short Paper: DeFi Deception\u2014Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects. In International Conference on Financial Cryptography and Data Security. Springer Nature Switzerland, Cham, 363-372."},{"key":"e_1_3_2_1_5_1","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Agarwal Sharad","year":"2025","unstructured":"Sharad Agarwal, Emma Harvey, Enrico Mariconti, Guillermo Suarez-Tangil, Marie Vasek, et al., 2025a. 'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United Kingdom. In 34th USENIX Security Symposium (USENIX Security 25). USENIX Association, Seattle, WA, USA."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3689664"},{"key":"e_1_3_2_1_7_1","unstructured":"Sharad Agarwal Guillermo Suarez-Tangil and Marie Vasek. 2025b. An Overview of 7726 User Reports: Uncovering SMS Scams and Scammer Strategies. https:\/\/arxiv.org\/abs\/2508.05276. arXiv:2508.05276 [cs.CR]"},{"key":"e_1_3_2_1_8_1","volume-title":"In 24th Workshop on the Economics of Information Security (WEIS). WEIS","author":"Agarwal Sharad","year":"2025","unstructured":"Sharad Agarwal and Marie Vasek. 2025. Examining Newly Registered Phishing Domains at Scale. In In 24th Workshop on the Economics of Information Security (WEIS). WEIS, Tokyo, Japan."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1145\/2901739.2903508","volume-title":"Proceedings of the 13th International Conference on Mining Software Repositories (MSR '16)","author":"Allix Kevin","year":"2016","unstructured":"Kevin Allix, Tegawend\u00e9 F. Bissyand\u00e9, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Conference on Mining Software Repositories (MSR '16). IEEE, Austin, TX, USA, 468-471."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/SP.2017.32","volume-title":"2017 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Alrwais Sumayah","year":"2017","unstructured":"Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, Raheem Beyah, and Damon McCoy. 2017a. Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, US, 805-823."},{"key":"e_1_3_2_1_11_1","first-page":"805","volume-title":"Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Alrwais Sumayah","year":"2017","unstructured":"Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem Beyah, and Damon McCoy. 2017b. Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA, 805-823."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2575828"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10676-018-9495-z","article-title":"Revisiting the Belmont Report's ethical principles in internet-mediated research: Perspectives from disciplinary associations in the social sciences","volume":"21","author":"Anabo Icy Fresno","year":"2019","unstructured":"Icy Fresno Anabo, Iciar Elexpuru-Albizuri, and Lourdes Villard\u00f3n-Gallego. 2019. Revisiting the Belmont Report's ethical principles in internet-mediated research: Perspectives from disciplinary associations in the social sciences. Ethics and Information Technology, Vol. 21, 2 (2019), 137-149.","journal-title":"Ethics and Information Technology"},{"key":"e_1_3_2_1_14_1","volume-title":"In 18th Workshop on the Economics of Information Security (WEIS). WEIS","author":"Anderson Ross","year":"2019","unstructured":"Ross Anderson, Chris Barton, Rainer B\u00f6lme, Richard Clayton, Carlos Ga n\u00e1n, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. 2019. Measuring the changing cost of cybercrime. In In 18th Workshop on the Economics of Information Security (WEIS). WEIS, Boston, MA, USA."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). Association for Computing Machinery","author":"Balduzzi Marco","year":"2016","unstructured":"Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, and Mustaque Ahamad. 2016. MobiPot: Understanding Mobile Telephony Threats with Honeycards. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). Association for Computing Machinery, New York, NY, USA, 723\u2013734."},{"key":"e_1_3_2_1_16_1","unstructured":"Artur Barseghyan. 2013. tld 0.13. https:\/\/pypi.org\/project\/tld."},{"key":"e_1_3_2_1_17_1","unstructured":"Bradley Barth. 2016. Snack attack: A crimeware-as-a-service menu for wannabe hackers. https:\/\/www.scworld.com\/news\/snack-attack-a-crimeware-as-a-service-menu-for-wannabe-hackers."},{"key":"e_1_3_2_1_18_1","first-page":"3757","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Bijmans Hugo","year":"2021","unstructured":"Hugo Bijmans, Tim Booij, Anneke Schwedersky, Aria Nedgabat, and Rolf van Wegberg. 2021. Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Virtual, USA, 3757-3774."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1057\/s41284-022-00359-w","article-title":"Card-not-present fraud: Using crime scripts to inform crime prevention initiatives","volume":"36","author":"Bodker Amanda","year":"2022","unstructured":"Amanda Bodker, Phil Connolly, Oliver Sing, Benjamin Hutchins, Michael Townsley, and Jacqueline Drew. 2022. Card-not-present fraud: Using crime scripts to inform crime prevention initiatives. Security Journal, Vol. 36 (2022), 693\u2013711.","journal-title":"Security Journal"},{"key":"e_1_3_2_1_20_1","unstructured":"Broadcom. 2024. Russian bulletproof hosting services exploited for malicious activities SocGholish malware campaigns. https:\/\/www.broadcom.com\/support\/security-center\/protection-bulletin\/russian-bulletproof-hosting-services-exploited-for-malicious-activities-socgholish-malware-campaigns."},{"key":"e_1_3_2_1_21_1","volume-title":"Public Short Message Service Corpus: The NUS SMS Corpus. Language Resources and Evaluation","volume":"47","author":"Chen Tao","year":"2012","unstructured":"Tao Chen and Min-Yen Kan. 2012. Creating a Live, Public Short Message Service Corpus: The NUS SMS Corpus. Language Resources and Evaluation, Vol. 47 (Aug. 2012), 299\u2013335."},{"key":"e_1_3_2_1_22_1","unstructured":"Cisco Talos Intelligence Group. 2024. PhishTank. https:\/\/www.phishtank.com."},{"key":"e_1_3_2_1_23_1","unstructured":"City of London Police. 2024. Two people arrested in connection with investigation into homemade mobile antenna used to send thousands of smishing text messages to the public. https:\/\/www.cityoflondon.police.uk\/news\/city-of-london\/news\/2024\/june\/two-people-arrested-in-connection-with-investigation-into-homemade-mobile-antenna-used-to-send-thousands-of-smishing-text-messages-to-the-public\/."},{"key":"e_1_3_2_1_24_1","volume-title":"A coefficient of agreement for nominal scales. Educational and psychological measurement","author":"Cohen Jacob","year":"1960","unstructured":"Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement, Vol. 20, 1 (1960), 37-46."},{"key":"e_1_3_2_1_25_1","unstructured":"Kevin Collier. 2021. Odd text from a wrong number? It's probably a scam. https:\/\/www.nbcnews.com\/tech\/security\/wrong-number-text-scam-rcna39793."},{"key":"e_1_3_2_1_26_1","unstructured":"Casey Crane. 2025. Industry Leaders Approve the Move to a 47-Day SSL Certificate Validity Period. https:\/\/sectigostore.com\/blog\/47-day-ssl-certificate-validity\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Leslie Daigle. 2004. WHOIS protocol specification. https:\/\/www.rfc-editor.org\/rfc\/rfc3912.","DOI":"10.17487\/rfc3912"},{"key":"e_1_3_2_1_28_1","unstructured":"Gert Van de Ven. 2023. IMSI-catcher used in massive phishing campaign leads to arrests in France. https:\/\/www.conquer-your-risk.com\/2023\/02\/24\/imsi-catcher-used-in-massive-phishing-campaign-leads-to-arrests-in-france\/."},{"key":"e_1_3_2_1_29_1","unstructured":"Dedicated Card and Payment Crime Unit (DCPCU). 2023. This week with support from partners the DCPCU executed four search warrants across England. https:\/\/bit.ly\/3NuqjwD."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.053"},{"key":"e_1_3_2_1_31_1","volume-title":"Gender, & Demographics","author":"Duarte Fabio","year":"2025","unstructured":"Fabio Duarte. 2025. Reddit User Age, Gender, & Demographics (2025). https:\/\/explodingtopics.com\/blog\/reddit-users."},{"key":"e_1_3_2_1_32_1","unstructured":"Gerry Eaton. 2024. Bulletproof Hosting Havens for FIN7 and Russian Cyber Threat Groups. https:\/\/threatshare.ai\/research\/bulletproof-hosting-havens-for-fin7-and-russian-cyber-threat-groups\/."},{"key":"e_1_3_2_1_33_1","unstructured":"Sec Edu. 2021. SMiShing dataset. https:\/\/in.pinterest.com\/seceduau\/smishing-dataset\/."},{"key":"e_1_3_2_1_34_1","unstructured":"Ericsson Mobility. 2025. Ericsson Mobility Visualizer. https:\/\/www.ericsson.com\/en\/reports-and-papers\/mobility-report\/mobility-visualizer."},{"key":"e_1_3_2_1_35_1","unstructured":"Ethnologue. 2025. What are the top 200 most spoken languages? https:\/\/www.ethnologue.com\/insights\/ethnologue200\/."},{"key":"e_1_3_2_1_36_1","volume-title":"DIRECTIVE 2006\/24\/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. https:\/\/eur-lex.europa.eu\/eli\/dir\/2006\/24\/oj.","author":"Union European","year":"2006","unstructured":"European Union. 2006. DIRECTIVE 2006\/24\/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. https:\/\/eur-lex.europa.eu\/eli\/dir\/2006\/24\/oj."},{"key":"e_1_3_2_1_37_1","unstructured":"EUROPOL. 2023. Action against criminal website that offered `spoofing' services to fraudsters: 142 arrests. hrefhttps:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/action-against-criminal-website-offered-'spoofing'-services-to-fraudsters-142-arrestshttps:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/action-against-criminal-website-offered-`spoofing'-services-to-fraudsters-142-arrests."},{"key":"e_1_3_2_1_38_1","unstructured":"Harry Everett. 2024. Out of the shadows \u2013 `darcula' iMessage and RCS smishing attacks target USPS and global postal services. https:\/\/www.netcraft.com\/blog\/darcula-smishing-attacks-target-usps-and-global-postal-services\/."},{"key":"e_1_3_2_1_39_1","unstructured":"FBI. 2025. https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2024_IC3Report.pdf."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075552"},{"key":"e_1_3_2_1_41_1","unstructured":"Federal Network Agency. 2025. Monitoring measures and information. https:\/\/www.bundesnetzagentur.de\/863984."},{"key":"e_1_3_2_1_42_1","unstructured":"Federal Trade Commission (FTC). 2022. How to Recognize and Report Spam Text Messages. https:\/\/consumer.ftc.gov\/articles\/how-recognize-and-report-spam-text-messages."},{"key":"e_1_3_2_1_43_1","volume-title":"IYKYK: The top text scams of","author":"Fletcher Emma","year":"2023","unstructured":"Emma Fletcher. 2023. IYKYK: The top text scams of 2022. https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/06\/iykyk-top-text-scams-2022."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617072.3617109"},{"key":"e_1_3_2_1_45_1","unstructured":"Google. 2023. Report spam in Google Messages. https:\/\/support.google.com\/messages\/answer\/9061432."},{"key":"e_1_3_2_1_46_1","unstructured":"Google. 2024a. Google Safe Browsing - Google Transparency Report. https:\/\/transparencyreport.google.com\/safe-browsing\/search."},{"key":"e_1_3_2_1_47_1","unstructured":"Google. 2024b. Safe Browsing APIs (v4). https:\/\/developers.google.com\/safe-browsing\/v4\/."},{"key":"e_1_3_2_1_48_1","unstructured":"Google. 2025. New AI-Powered Scam Detection Features to Help Protect You on Android. https:\/\/security.googleblog.com\/2025\/03\/new-ai-powered-scam-detection-features.html."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10)","author":"Grier Chris","year":"2010","unstructured":"Chris Grier, Kurt Thomas, Vern Paxson, and Michael Zhang. 2010. @spam: the underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10). Association for Computing Machinery, New York, NY, USA, 27\u201337."},{"key":"e_1_3_2_1_50_1","unstructured":"Anti-Phishing Working Group. 2004. The APWG eCrime Exchange (eCX). https:\/\/apwg.org\/ecx\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/ECRIME.2014.6963161","volume-title":"2014 APWG Symposium on Electronic Crime Research (eCrime). IEEE","author":"Gupta Neha","year":"2014","unstructured":"Neha Gupta, Anupama Aggarwal, and Ponnurangam Kumaraguru. 2014. bit. ly\/malicious: Deep dive into short URL based e-crime detection. In 2014 APWG Symposium on Electronic Crime Research (eCrime). IEEE, Birmingham, AL, US, 14-24."},{"key":"e_1_3_2_1_52_1","unstructured":"Samuel Hoffstaetter. 2014. pytesseract 0.3.13. https:\/\/pypi.org\/project\/pytesseract\/."},{"key":"e_1_3_2_1_53_1","first-page":"425","volume-title":"2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE","author":"Hurier M\u00e9d\u00e9ric","year":"2017","unstructured":"M\u00e9d\u00e9ric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash, Tegawend\u00e9 F Bissyand\u00e9, Yves Le Traon, Jacques Klein, and Lorenzo Cavallaro. 2017. Euphony: Harmonious unification of cacophonous anti-virus vendor labels for android malware. In 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR). IEEE, Buenos Aires, Argentina, 425-435."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.53899\/spjrd.v29i1.287","article-title":"Scammer Strategies and Social Actions in Online Filipino Transactions","volume":"29","author":"Kiarah Reyshylle","year":"2024","unstructured":"Kiarah Reyshylle Iba nez. 2024. Scammer Strategies and Social Actions in Online Filipino Transactions. Southeastern Philippines Journal of Research and Development, Vol. 29, 1 (2024), 43-75.","journal-title":"Southeastern Philippines Journal of Research and Development"},{"key":"e_1_3_2_1_55_1","unstructured":"Internet Assigned Numbers Authority (IANA). 2024. Root Zone Database. https:\/\/www.iana.org\/domains\/root\/db."},{"key":"e_1_3_2_1_56_1","unstructured":"Interpol. 2025. More than 300 arrests as African countries clamp down on cyber threats. https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2025\/More-than-300-arrests-as-African-countries-clamp-down-on-cyber-threats."},{"key":"e_1_3_2_1_57_1","unstructured":"IPinfo. 2024. The Trusted Source For IP Address Data. https:\/\/ipinfo.io\/."},{"key":"e_1_3_2_1_58_1","first-page":"617","volume-title":"Rule-Based Framework for Detection of Smishing Messages in Mobile Environment. Procedia Computer Science","volume":"125","author":"Jain Ankit Kumar","year":"2018","unstructured":"Ankit Kumar Jain and B. B. Gupta. 2018. Rule-Based Framework for Detection of Smishing Messages in Mobile Environment. Procedia Computer Science, Vol. 125 (jan 2018), 617-623."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.4018\/JITR.2019040102"},{"key":"e_1_3_2_1_60_1","volume-title":"Xing Wang, Shuming Shi, and Zhaopeng Tu.","author":"Jiao Wenxiang","year":"2023","unstructured":"Wenxiang Jiao, Wenxuan Wang, Jen tse Huang, Xing Wang, Shuming Shi, and Zhaopeng Tu. 2023. Is ChatGPT A Good Translator? Yes With GPT-4 As The Engine. https:\/\/arxiv.org\/abs\/2301.08745. arXiv:2301.08745 [cs.CL]"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0269-9"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS '21). Association for Computing Machinery","author":"Kim Doowon","year":"2021","unstructured":"Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doup\u00e9, Sooel Son, Gail-Joon Ahn, and Tudor Dumitras. 2021. Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS '21). Association for Computing Machinery, New York, NY, USA, 407\u2013420."},{"key":"e_1_3_2_1_63_1","first-page":"625","volume-title":"Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery","author":"Konte Maria","year":"2015","unstructured":"Maria Konte, Roberto Perdisci, and Nick Feamster. 2015. Aswatch: An as reputation system to expose bulletproof hosting ases. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, New York, NY, USA, 625-638."},{"key":"e_1_3_2_1_64_1","first-page":"1","volume-title":"2018 APWG Symposium on Electronic Crime Research (eCrime). IEEE","author":"Page Sophie Le","year":"2018","unstructured":"Sophie Le Page, Guy-Vincent Jourdan, Gregor V. Bochmann, Jason Flood, and Iosif-Viorel Onut. 2018. Using URL shorteners to compare phishing and malware attacks. In 2018 APWG Symposium on Electronic Crime Research (eCrime). IEEE, San Diego, CA, US, 1-13."},{"key":"e_1_3_2_1_65_1","first-page":"1","volume-title":"2021 APWG Symposium on Electronic Crime Research (eCrime). IEEE","author":"Lee Kevin","year":"2021","unstructured":"Kevin Lee and Arvind Narayanan. 2021. Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States. In 2021 APWG Symposium on Electronic Crime Research (eCrime). IEEE, Boston, MA, USA, 1-17."},{"key":"e_1_3_2_1_66_1","first-page":"930","volume-title":"Detecting and Characterizing SMS Spearphishing Attacks. In Annual Computer Security Applications Conference. Association for Computing Machinery","author":"Liu Mingxuan","year":"2021","unstructured":"Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, and Donghong Sun. 2021. Detecting and Characterizing SMS Spearphishing Attacks. In Annual Computer Security Applications Conference. Association for Computing Machinery, New York, NY, USA, 930-943."},{"key":"e_1_3_2_1_67_1","unstructured":"Larry Loeb. 2019. Servers Discovered With Multiple Malware Families Staged & Ready to Launch. https:\/\/www.darkreading.com\/application-security\/servers-discovered-with-multiple-malware-families-staged-ready-to-launch."},{"key":"e_1_3_2_1_68_1","volume-title":"Usenix Enigma Conference. USENIX Association, OAKLAND, CA, USA.","author":"Mahjoub Dhia","year":"2017","unstructured":"Dhia Mahjoub. 2017. Behaviors and patterns of bulletproof and anonymous hosting providers. In Usenix Enigma Conference. USENIX Association, OAKLAND, CA, USA."},{"key":"e_1_3_2_1_69_1","unstructured":"Mavenir. 2025. SpamShield Messaging Fraud. hrefhttps:\/\/www.mavenir.com\/portfolio\/mavapps\/fraud-security\/spamshield-messaging-fraud\/https:\/\/www.mavenir.com\/portfolio\/mavapps\/fraud-security\/spamshield-messaging-fraud\/."},{"key":"e_1_3_2_1_70_1","unstructured":"Tomas Meskauskas. 2023. How to remove SMSSpy malware from your Android device. https:\/\/www.pcrisk.com\/removal-guides\/23541-smsspy-malware-android."},{"key":"e_1_3_2_1_71_1","unstructured":"Mara Miller. 2025. What an SMS Aggregator Is and How to Choose One. https:\/\/www.vibes.com\/blog\/what-is-an-sms-aggregator."},{"key":"e_1_3_2_1_72_1","unstructured":"Ministry for Digital Transformation and Public Service. 2025. BOE-A-2025-2870 Orden TDF\/149\/2025 de 12 de febrero por la que se establecen medidas para combatir las estafas de suplantaci\u00f3n de identidad a trav\u00e9s de llamadas telef\u00f3nicas y mensajes de texto fraudulentos y para garantizar la identificaci\u00f3n de la numeraci\u00f3n utilizada para la prestaci\u00f3n de servicios de atenci\u00f3n al cliente y realizaci\u00f3n de llamadas comerciales no solicitadas. https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-2025-2870."},{"key":"e_1_3_2_1_73_1","volume-title":"The Belmont Report: The triple crown of research ethics. Dimensions of critical care nursing","author":"Miracle Vickie A","year":"2016","unstructured":"Vickie A Miracle. 2016. The Belmont Report: The triple crown of research ethics. Dimensions of critical care nursing, Vol. 35, 4 (2016), 223-228."},{"key":"e_1_3_2_1_74_1","first-page":"1","volume-title":"SMS Phishing and Mitigation Approaches. In 2019 Twelfth International Conference on Contemporary Computing (IC3). IEEE","author":"Mishra Sandhya","year":"2019","unstructured":"Sandhya Mishra and Devpriya Soni. 2019. SMS Phishing and Mitigation Approaches. In 2019 Twelfth International Conference on Contemporary Computing (IC3). IEEE, Noida, India, 1-5."},{"key":"e_1_3_2_1_75_1","first-page":"803","volume-title":"Future Generation Computer Systems","volume":"108","author":"Mishra Sandhya","year":"2020","unstructured":"Sandhya Mishra and Devpriya Soni. 2020. Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis. Future Generation Computer Systems, Vol. 108 (July 2020), 803-815."},{"key":"e_1_3_2_1_76_1","first-page":"4975","volume-title":"Neural Computing and Applications","volume":"35","author":"Mishra Sandhya","year":"2021","unstructured":"Sandhya Mishra and Devpriya Soni. 2021. DSmishSMS-A System to Detect Smishing SMS. Neural Computing and Applications, Vol. 35 (July 2021), 4975-4992."},{"key":"e_1_3_2_1_77_1","unstructured":"Mobile Ecosystem Forum (MEF). 2020. SMS SenderID Protection Registry. https:\/\/mobileecosystemforum.com\/sms-senderid-protection-registry\/."},{"key":"e_1_3_2_1_78_1","first-page":"1","volume-title":"2023 7th Network Traffic Measurement and Analysis Conference (TMA). IEEE","author":"Moreno Jos\u00e9 Miguel","year":"2023","unstructured":"Jos\u00e9 Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, and Juan Tapiador. 2023. Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem. In 2023 7th Network Traffic Measurement and Analysis Conference (TMA). IEEE, Naples, Italy, 1-10."},{"key":"e_1_3_2_1_79_1","unstructured":"David Morris. 2021. What is a HLR Lookup? https:\/\/www.hlrlookup.com\/what-is-a-hlr-lookup\/."},{"key":"e_1_3_2_1_80_1","volume-title":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS '24)","author":"Moura Giovane C. M.","unstructured":"Giovane C. M. Moura, Thomas Daniels, Maarten Bosteels, Sebastian Castro, Moritz M\u00fcller, Thymen Wabeke, Thijs van den Hout, Maciej Korczy?ski, and Georgios Smaragdakis. 2024. Characterizing and Mitigating Phishing Attacks at ccTLD Scale. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS '24). Association for Computing Machinery, New York, NY, USA, 2147\u20132161."},{"key":"e_1_3_2_1_81_1","first-page":"169","volume-title":"2024 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Nahapetyan Aleksandr","year":"2024","unstructured":"Aleksandr Nahapetyan, Sathvik Prasad, Kevin Childs, Adam Oest, Yeganeh Ladwig, Alexandros Kapravelos, and Bradley Reaves. 2024. On sms phishing tactics and infrastructure. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 169-169."},{"key":"e_1_3_2_1_82_1","unstructured":"Ofcom. 2023. 45 million people targeted by scam calls and texts this summer. https:\/\/www.ofcom.org.uk\/phones-and-broadband\/scam-calls-and-messages\/45-million-people-targeted-by-scams."},{"key":"e_1_3_2_1_83_1","unstructured":"Ofcom. 2024a. Experiences of suspicious calls texts and app messages. https:\/\/www.ofcom.org.uk\/siteassets\/resources\/documents\/research-and-data\/telecoms-research\/scams-research\/experiences-of-suspicious-calls-texts-and-app-messages-research-2024.pdf."},{"key":"e_1_3_2_1_84_1","unstructured":"Ofcom. 2024b. How to report scam texts and mobile calls to 7726. https:\/\/www.ofcom.org.uk\/phones-and-broadband\/scam-calls-and-messages\/7726-reporting-scam-texts-and-calls\/."},{"key":"e_1_3_2_1_85_1","unstructured":"Ofcom. 2024c. Reducing mobile messaging scams. https:\/\/www.ofcom.org.uk\/siteassets\/resources\/documents\/consultations\/category-1-10-weeks\/call-for-input-reducing-mobile-messaging-scams\/main-documents\/cfi-reducing-mobile-messaging-scams.pdf."},{"key":"e_1_3_2_1_86_1","unstructured":"OpenPhish. 2024. Phishing Intelligence. https:\/\/openphish.com\/index.html."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1186\/s40163-025-00248-8","article-title":"Applications of AI-Based Models for Online Fraud Detection and Analysis","volume":"14","author":"Papasavva Antonis","year":"2025","unstructured":"Antonis Papasavva, Samantha Lundrigan, Ed Lowther, Shane Johnson, Enrico Mariconti, Anna Markovska, and Nilufer Tuptuk. 2025. Applications of AI-Based Models for Online Fraud Detection and Analysis. Crime Science, Vol. 14, 1 (2025), 7.","journal-title":"Crime Science"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"e_1_3_2_1_89_1","unstructured":"A. Paul. 2021. crtsh 0.3.1. https:\/\/pypi.org\/project\/crtsh\/."},{"key":"e_1_3_2_1_90_1","unstructured":"Chris Pemberton. 2016. Tap Into The Marketing Power of SMS. https:\/\/www.gartner.com\/en\/marketing\/insights\/articles\/tap-into-the-marketing-power-of-sms."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"key":"e_1_3_2_1_92_1","first-page":"195","volume-title":"Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable Societies. Association for Computing Machinery","author":"Pervaiz Fahad","year":"2019","unstructured":"Fahad Pervaiz, Rai Shah Nawaz, Muhammad Umer Ramzan, Maryem Zafar Usmani, Shrirang Mare, Kurtis Heimerl, Faisal Kamiran, Richard Anderson, and Lubna Razaq. 2019. An assessment of SMS fraud in Pakistan. In Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable Societies. Association for Computing Machinery, New York, NY, USA, 195-205."},{"key":"e_1_3_2_1_93_1","volume-title":"Cybersecurity: The 2022 Board Perspective. https:\/\/www.proofpoint.com\/sites\/default\/files\/white-papers\/pfpt-us-wp-board-perspective-report.pdf.","year":"2022","unstructured":"Proofpoint. 2022. Cybersecurity: The 2022 Board Perspective. https:\/\/www.proofpoint.com\/sites\/default\/files\/white-papers\/pfpt-us-wp-board-perspective-report.pdf."},{"key":"e_1_3_2_1_94_1","volume-title":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). Association for Computing Machinery","author":"Quinkert Florian","year":"2020","unstructured":"Florian Quinkert, Martin Degeling, Jim Blythe, and Thorsten Holz. 2020. Be the Phisher - Understanding Users' Perception of Malicious Domains. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20). Association for Computing Machinery, New York, NY, USA, 263\u2013276."},{"key":"e_1_3_2_1_95_1","first-page":"339","volume-title":"2016 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Reaves Bradley","unstructured":"Bradley Reaves, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, and Kevin R. B. Butler. 2016. Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA, 339-356."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3268932","article-title":"Characterizing the Security of the SMS Ecosystem with Public Gateways","volume":"22","author":"Reaves Bradley","year":"2018","unstructured":"Bradley Reaves, Luis Vargas, Nolen Scaife, Dave Tian, Logan Blue, Patrick Traynor, and Kevin R. B. Butler. 2018. Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur., Vol. 22, 1 (Dec. 2018), 31 pages.","journal-title":"ACM Trans. Priv. Secur."},{"key":"e_1_3_2_1_97_1","unstructured":"Robokiller. 2023. Wrong-number text scams exposed: What you need to know. https:\/\/www.robokiller.com\/blog\/wrong-number-text-scams."},{"key":"e_1_3_2_1_98_1","volume-title":"DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram. In 34th USENIX Security Symposium (USENIX Security 25)","author":"Roy Sayak Saha","year":"2025","unstructured":"Sayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohamaddi, and Shirin Nilizadeh. 2025. DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram. In 34th USENIX Security Symposium (USENIX Security 25). USENIX Association, Seattle, WA, USA."},{"key":"e_1_3_2_1_99_1","unstructured":"RTE. 2024. MWC hears SMS fraud a headache for telecom operators. https:\/\/www.rte.ie\/news\/business\/2024\/0228\/1434908-mwc-hears-sms-fraud-a-headache-for-telecom-operators\/."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3217795"},{"key":"e_1_3_2_1_101_1","volume-title":"Proceedings of the 2023 ACM on Internet Measurement Conference (IMC '23)","author":"Roy Sayak Saha","year":"2023","unstructured":"Sayak Saha Roy, Unique Karanjit, and Shirin Nilizadeh. 2023. Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services. In Proceedings of the 2023 ACM on Internet Measurement Conference (IMC '23). Association for Computing Machinery, New York, NY, USA, 268\u2013281."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"crossref","first-page":"821","DOI":"10.52633\/jemi.v5i5.359","article-title":"Developing proficiency in english language and embarking on the journey of global entrepreneurship: a pathway to achieving success","volume":"5","author":"Siddiqui Shagufta Khurram","year":"2023","unstructured":"Shagufta Khurram Siddiqui, Farhana Yasmeen Qadri, and Zulfiquar Ali Chachar. 2023. Developing proficiency in english language and embarking on the journey of global entrepreneurship: a pathway to achieving success. Journal of Entrepreneurship, Management, and Innovation, Vol. 5, 5 (2023), 821-837.","journal-title":"Journal of Entrepreneurship, Management, and Innovation"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423617"},{"key":"e_1_3_2_1_104_1","first-page":"1","volume-title":"2022 APWG Symposium on Electronic Crime Research (eCrime). IEEE","author":"Siu Gilberto Atondo","year":"2022","unstructured":"Gilberto Atondo Siu, Alice Hutchings, Marie Vasek, and Tyler Moore. 2022. ''Invest in crypto!'': An analysis of investment scam advertisements found in Bitcointalk. In 2022 APWG Symposium on Electronic Crime Research (eCrime). IEEE, Boston, MA, USA, 1-12."},{"key":"e_1_3_2_1_105_1","unstructured":"Spamhaus. 2024. Passive DNS. https:\/\/www.spamhaus.com\/product\/passive-dns\/."},{"key":"e_1_3_2_1_106_1","volume-title":"Computer Security-ESORICS 2016: 21st European Symposium on Research in Computer Security","author":"Srinivasan Bharat","unstructured":"Bharat Srinivasan, Payas Gupta, Manos Antonakakis, and Mustaque Ahamad. 2016. Understanding cross-channel abuse with sms-spam support infrastructure attribution. In Computer Security-ESORICS 2016: 21st European Symposium on Research in Computer Security. Springer International Publishing, Cham, 3-26."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897872"},{"key":"e_1_3_2_1_108_1","volume-title":"Leading countries based on number of X (formerly Twitter) users as of","year":"2024","unstructured":"Statista. 2024. Leading countries based on number of X (formerly Twitter) users as of April 2024. https:\/\/www.statista.com\/statistics\/242606\/number-of-active-twitter-users-in-selected-countries\/."},{"key":"e_1_3_2_1_109_1","unstructured":"Caroline Tagg. 2009. A corpus linguistics study of SMS text messaging. Ph.D. Dissertation. University of Birmingham."},{"key":"e_1_3_2_1_110_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)","author":"Tang Siyuan","year":"2022","unstructured":"Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, and Kai Chen. 2022. Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22). Association for Computing Machinery, New York, NY, USA, 2751\u20132764."},{"key":"e_1_3_2_1_111_1","volume-title":"Proceedings of the 11th ACM Symposium on Document Engineering. Association for Computing Machinery","author":"Tiago A.","unstructured":"A. Tiago, J. Hidalgo, and Y. Akebo. 2011. Contributions to the Study of SMS Spam Filtering: New Collection and Results. In Proceedings of the 11th ACM Symposium on Document Engineering. Association for Computing Machinery, New York, NY, USA, 259\u2013262."},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278569"},{"key":"e_1_3_2_1_113_1","first-page":"289","volume-title":"Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery","author":"Timko Daniel","year":"2024","unstructured":"Daniel Timko and Muhammad Lutfor Rahman. 2024. Smishing Dataset I: Phishing SMS Dataset from Smishtank. com. In Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, New York, NY, USA, 289-294."},{"key":"e_1_3_2_1_114_1","unstructured":"Bill Toulas. 2022. Revolut hack exposes data of 50 000 users fuels new phishing wave. https:\/\/www.bleepingcomputer.com\/news\/security\/revolut-hack-exposes-data-of-50-000-users-fuels-new-phishing-wave\/."},{"key":"e_1_3_2_1_115_1","unstructured":"Trend Micro. 2022. Ukraine Charitable Donation Scams Are Misusing the Name of a Legitimate Charity. https:\/\/news.trendmicro.com\/2022\/04\/12\/ukraine-charity-scammers-impersonating-legitimate-charity\/."},{"key":"e_1_3_2_1_116_1","unstructured":"UK Home Office. 2025. Major step for fraud prevention with landmark ban on SIM farms. https:\/\/www.gov.uk\/government\/news\/major-step-for-fraud-prevention-with-landmark-ban-on-sim-farms."},{"key":"e_1_3_2_1_117_1","unstructured":"VirusTotal. 2024a. VirusTotal. https:\/\/docs.virustotal.com\/docs\/how-it-works."},{"key":"e_1_3_2_1_118_1","unstructured":"VirusTotal. 2024b. What is the difference between the public API and the private API? https:\/\/docs.virustotal.com\/docs\/difference-public-private."},{"key":"e_1_3_2_1_119_1","volume-title":"Proceedings of the 2023 ACM on Internet Measurement Conference (IMC '23)","author":"Wang Jingjing","year":"2023","unstructured":"Jingjing Wang, Liu Wang, Feng Dong, and Haoyu Wang. 2023. Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples. In Proceedings of the 2023 ACM on Internet Measurement Conference (IMC '23). Association for Computing Machinery, New York, NY, USA, 253\u2013267."},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s10664-021-09974-4","article-title":"Beyond the virus: a first look at coronavirus-themed Android malware","volume":"26","author":"Wang Liu","year":"2021","unstructured":"Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, et al., 2021. Beyond the virus: a first look at coronavirus-themed Android malware. Empirical Software Engineering, Vol. 26, 4 (2021), 82.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_1_121_1","volume-title":"Proc. ACM Meas. Anal. Comput. Syst.","volume":"6","author":"Wang Liu","year":"2022","unstructured":"Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, and Xuanzhe Liu. 2022. MalRadar: Demystifying Android Malware in the New Era. Proc. ACM Meas. Anal. Comput. Syst., Vol. 6, 2, Article 40 (June 2022), 27 pages."},{"key":"e_1_3_2_1_122_1","unstructured":"WhoisXMLAPI. 2024. WHOIS API offers unified & consistent data. hrefhttps:\/\/whois.whoisxmlapi.comhttps:\/\/whois.whoisxmlapi.com."},{"key":"e_1_3_2_1_123_1","first-page":"1","volume-title":"2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE","author":"Wu Longfei","year":"2014","unstructured":"Longfei Wu, Xiaojiang Du, and Jie Wu. 2014. MobiFish: A lightweight anti-phishing scheme for mobile phones. In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, Shanghai, China, 1-8."},{"key":"e_1_3_2_1_124_1","unstructured":"Angelin Yeoh. 2022. Maybank warns of malicious SMSSpy campaign targeting Android users in Malaysia. https:\/\/www.thestar.com.my\/tech\/tech-news\/2022\/06\/02\/maybank-warns-of-malicious-smsspy-campaign-targeting-android-users-in-malaysia."},{"key":"e_1_3_2_1_125_1","unstructured":"Zimperium. 2025. The Evolution of Mobile-Specific Phishing Attacks. https:\/\/lp.zimperium.com\/hubfs\/MTD\/REPORT\/GENERIC\/Mishing Threat Report26Q1.pdf. endthebibl"}],"event":{"name":"IMC '25:ACM Internet Measurement Conference","location":"Madison WI USA","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2025 ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3764431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:27:24Z","timestamp":1763738844000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3730567.3764431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"references-count":125,"alternative-id":["10.1145\/3730567.3764431","10.1145\/3730567"],"URL":"https:\/\/doi.org\/10.1145\/3730567.3764431","relation":{},"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}