🔴 High Threat
This message is very likely to be malicious or a smishing attempt.
Common signs:
Contains links flagged by global phishing databases
Uses impersonation or spoofing language
Urgent call-to-action (“click now,” “verify your account,” “pay immediately”)
Targets sensitive information (credentials, payments, payroll, etc.)
📢 Recommended action: Do not click any links. Report to your IT/security team (it automatically is, if you're on a business or partner plan). Delete the message.
🟠 Medium Threat
This message contains suspicious content, but lacks enough evidence to be flagged as outright malicious.
Common signs:
Vague or generic language (“You’ve won a prize!”)
Message appears unsolicited or out of context
Unusual formatting, odd grammar, or link shorteners
📢 Recommended action: Use caution. If you weren’t expecting the message, do not engage. Screenshot and monitor if it escalates. Delete the message.
🟢 Low Threat (No Known Threats)
The message appears clean based on known patterns and databases.
Reasons a message might be marked as low-risk:
No link or phone number present
Link does not match known threat patterns
Language and structure do not match known social engineering tactics
✅ However... always stay alert. If something feels off — especially in a business context — it’s still worth double-checking.
🏢 Business & Partner Accounts: Automated Alerts & Integration
For organizations using SmishAlert through a business or partner plan:
High and Medium threat alerts can be automatically routed to your IT or security team
This ensures potential threats are escalated even if the user doesn’t report them manually
Our Open API architecture makes it easy to:
Feed alerts into your SIEM (e.g., Splunk, QRadar, LogRhythm)
Trigger downstream automation or incident response workflows
📣 Interested in setting this up? Contact us at [email protected] to learn how SmishAlert can integrate with your security stack.
