Skip to main content

What Do Threat Levels Mean? (High, Medium, Low)

When you submit a suspicious message to SmishAlert, we evaluate its risk level using AI, threat databases, and behavioral pattern matching.

Sophie avatar
Written by Sophie
Updated over 8 months ago

🔴 High Threat

This message is very likely to be malicious or a smishing attempt.

Common signs:

  • Contains links flagged by global phishing databases

  • Uses impersonation or spoofing language

  • Urgent call-to-action (“click now,” “verify your account,” “pay immediately”)

  • Targets sensitive information (credentials, payments, payroll, etc.)

📢 Recommended action: Do not click any links. Report to your IT/security team (it automatically is, if you're on a business or partner plan). Delete the message.


🟠 Medium Threat

This message contains suspicious content, but lacks enough evidence to be flagged as outright malicious.

Common signs:

  • Vague or generic language (“You’ve won a prize!”)

  • Message appears unsolicited or out of context

  • Unusual formatting, odd grammar, or link shorteners

📢 Recommended action: Use caution. If you weren’t expecting the message, do not engage. Screenshot and monitor if it escalates. Delete the message.


🟢 Low Threat (No Known Threats)

The message appears clean based on known patterns and databases.

Reasons a message might be marked as low-risk:

  • No link or phone number present

  • Link does not match known threat patterns

  • Language and structure do not match known social engineering tactics

However... always stay alert. If something feels off — especially in a business context — it’s still worth double-checking.


🏢 Business & Partner Accounts: Automated Alerts & Integration

For organizations using SmishAlert through a business or partner plan:

  • High and Medium threat alerts can be automatically routed to your IT or security team

  • This ensures potential threats are escalated even if the user doesn’t report them manually

  • Our Open API architecture makes it easy to:

    • Feed alerts into your SIEM (e.g., Splunk, QRadar, LogRhythm)

    • Trigger downstream automation or incident response workflows

📣 Interested in setting this up? Contact us at [email protected] to learn how SmishAlert can integrate with your security stack.

Did this answer your question?