{"id":27232,"date":"2021-09-08T16:48:00","date_gmt":"2021-09-08T14:48:00","guid":{"rendered":"https:\/\/perseus.de\/smishing-data-theft-in-the-event-of-a-message\/"},"modified":"2026-03-30T15:36:25","modified_gmt":"2026-03-30T13:36:25","slug":"smishing-data-theft-in-the-event-of-a-message","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/","title":{"rendered":"Smishing: data theft in the event of a message!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27232\" class=\"elementor elementor-27232 elementor-3437\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27231\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-768x512.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-300x200.jpg 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-1024x682.jpg 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: Mahbub Hasan via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2669262e e-flex e-con-boxed e-con e-parent\" data-id=\"2669262e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-125e438 e-con-full e-flex e-con e-child\" data-id=\"125e438\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d30bd47 e-con-full e-flex e-con e-child\" data-id=\"d30bd47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-067bc58 elementor-widget elementor-widget-text-editor\" data-id=\"067bc58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>08.09.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6e383 elementor-widget elementor-widget-heading\" data-id=\"ca6e383\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Smishing: data theft in the event of a message!\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ea8f1 elementor-widget elementor-widget-text-editor\" data-id=\"47ea8f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | Attack Vectors  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38d7896 e-con-full e-flex e-con e-child\" data-id=\"38d7896\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6c15fb elementor-widget elementor-widget-text-editor\" data-id=\"a6c15fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Phishing attacks are becoming more targeted \u2013 and sophisticated! More and more criminals are targeting mobile users by sending malicious content via SMS. What this is all about and how you can best protect yourself against it &#8211; just read on.  <\/strong><\/p><p>Have you ever received one of these SMS messages saying that a package you allegedly ordered could not be delivered and that you should download the service provider&#8217;s app via the link contained in the message in order to receive it after all? You hadn&#8217;t ordered anything&#8230; If you didn&#8217;t follow the instructions in this message, you&#8217;ve done everything right! This is because this is so-called smishing, i.e. phishing via SMS. And this scenario is only one of many.   <\/p><p><strong> <\/strong><\/p><h4><strong>Phishing rethought and made mobile<\/strong><\/h4><p>Despite the numerous messenger services that have sprung up like mushrooms in recent years, SMS is still a frequently used type of conversation on the smartphone. Especially in times of home office and remote work, in which private devices are used in everyday work, a large part of communication takes place via mobile phones and is perceived as largely secure. It is precisely this assumption that criminals take advantage of. The goal of the fraudsters is to use misleading SMS to access sensitive data and valuable information.   <\/p><p>Currently, smishing attacks can be divided into three different categories:<\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>Distribution of malware<\/strong><\/h4><p>The scenario described above is one of many and is based on classic email phishing. The link in the SMS leads to a website where an app is available for download. This looks confusingly similar to those of the parcel service providers or other service providers \u2013 see Factbox \u2013 but is a fake and contains a banking Trojan. It is activated when the supposed app is downloaded and can access or use all personal data, such as telephone numbers, e-mail addresses and bank details after installation. In addition, access can subsequently send further, malicious SMS to the contacts on the mobile phone \u2013 a chain reaction with fatal consequences.    <\/p><p>The most widespread banking Trojans of this type are currently FluBot and TeaBot. Android devices in particular are affected by this attack scenario, as the operating system allows apps to be installed from unknown sources. <\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>Bank Smishing<\/strong><\/h4><p>Of particular interest to cybercriminals are access data for online banking. The spread of fear is a particularly popular method for hackers to gain access to their victims&#8217; money deposits: They send SMS from the victim&#8217;s supposed bank with the information that the bank account has been hacked and provide a phone number or link to prevent further alleged damage. The phone number often leads directly to the criminals, the link in the message to a fake website. In both cases, the victims are to be persuaded to disclose their access data \u2013 only to find a plundered bank account afterwards. Often, the sender&#8217;s number can be hidden, so that many victims cannot tell from which source the text message originates.    <\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>The grandchild trick as SMS<\/strong><\/h4><p>This type of smishing mainly affects less tech-savvy people. In this case, con artists pretend to be acquaintances of the victim \u2013 the names are often learned via social media \u2013 and promise a financial advantage if you make a deposit in advance to a certain bank account. <\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>How you can best protect yourself and others from smishing<\/strong><\/h4><ol><li>Do not click on any of the links and block the sender&#8217;s phone number. If you are actually expecting a shipment and are not sure whether the SMS from your parcel delivery person will work, contact them directly. The same applies to your bank account: log in directly via the browser to get more information.  <\/li><li>Only use apps from reputable sources, i.e. the official app stores or from the provider&#8217;s website, to download apps.<\/li><li>On Android, there is the option to turn off the menu item &#8220;Install apps from unknown sources&#8221; in the settings. This is how you protect yourself \u2013 and others. <\/li><li>Report the smishing incident to the consumer advice centre. This will protect you not only yourself, but also others.<br>If such an incident occurs on your work phone, inform the members of your organization. <\/li><li>Raise your awareness of these types of attacks: ask yourself whether your bank or parcel service would send you such messages. Would they even have your cell phone number to do this? No bank calls your customers and asks for personal details over the phone. If you receive a call of this kind, end the call immediately.   <\/li><li>Pay attention to cryptic links and spelling in the body text. In the end, the following always applies: Better safe than sorry&#8230;. <\/li><\/ol><p><strong> <\/strong><\/p><h4><strong>Already clicked \u2013 how to do damage control<\/strong><\/h4><ol><li>If you suspect that you have been the victim of a smishing attack, put your mobile phone in airplane mode. This prevents the malicious software from being sent to your contacts. <\/li><li>Inform your mobile phone provider about the incident \u2013 and your bank if you have already disclosed your bank details.<\/li><li>Reset your smartphone to factory settings to erase installed and saved data.<\/li><\/ol><p> <\/p><p>Do you have any further questions about phishing or would you like to learn how you too can make your company cyber-secure? Our experts from Perseus Technologies will take care of your concerns and will be happy to advise you more intensively. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing attacks are becoming more targeted \u2013 and sophisticated! More and more criminals are targeting mobile users by sending malicious content via SMS. What this is all about and how you can best protect yourself against it &#8211; just read on.  <\/p>\n","protected":false},"author":3,"featured_media":27231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27232","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Smishing: data theft in the event of a message! - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smishing: data theft in the event of a message! - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Phishing attacks are becoming more targeted \u2013 and sophisticated! More and more criminals are targeting mobile users by sending malicious content via SMS. What this is all about and how you can best protect yourself against it - just read on.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-08T14:48:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:36:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Smishing: data theft in the event of a message!\",\"datePublished\":\"2021-09-08T14:48:00+00:00\",\"dateModified\":\"2026-03-30T13:36:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/\"},\"wordCount\":912,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/\",\"name\":\"Smishing: data theft in the event of a message! - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"datePublished\":\"2021-09-08T14:48:00+00:00\",\"dateModified\":\"2026-03-30T13:36:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smishing-data-theft-in-the-event-of-a-message\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smishing: data theft in the event of a message!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smishing: data theft in the event of a message! - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/","og_locale":"en_US","og_type":"article","og_title":"Smishing: data theft in the event of a message! - Perseus Technologies","og_description":"Phishing attacks are becoming more targeted \u2013 and sophisticated! More and more criminals are targeting mobile users by sending malicious content via SMS. What this is all about and how you can best protect yourself against it - just read on.","og_url":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/","og_site_name":"Perseus Technologies","article_published_time":"2021-09-08T14:48:00+00:00","article_modified_time":"2026-03-30T13:36:25+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Smishing: data theft in the event of a message!","datePublished":"2021-09-08T14:48:00+00:00","dateModified":"2026-03-30T13:36:25+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/"},"wordCount":912,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/","url":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/","name":"Smishing: data theft in the event of a message! - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","datePublished":"2021-09-08T14:48:00+00:00","dateModified":"2026-03-30T13:36:25+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/smishing-data-theft-in-the-event-of-a-message\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Smishing: data theft in the event of a message!"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27232"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27232\/revisions"}],"predecessor-version":[{"id":27233,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27232\/revisions\/27233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27231"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}