Connect with us

Technology

How hackers can send text messages from your phone without you knowing

Published

on

How hackers can send text messages from your phone without you knowing

There is enough to worry about in life without the additional stress and terror of finding out your friends, family or complete strangers have been receiving a text message from “you” without your knowledge. How did they do that? How did they send a text message from your phone without you knowing?

This is a real threat that many people face every day. That’s why we felt it was so important to answer this question sent in from John.

“I just found a text written to me, which was a response to a text I sent. Problem is, I didn’t send the text? I’m 65 years old, and not as spry as I once was, but I do not remember sending the text. My wife is trying to convince me I’m going crazy. She says it’s impossible for someone to send a text (impersonating me) without having possession of my phone. Is that true? Can someone hack your phone and send text??” – John, Fort Myers, FL

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

What is SMS spoofing?

We’re sorry to hear that you’re going through this, John. It is possible for someone to send a text message impersonating you without having possession of your phone. This is known as SMS spoofing, and it is a technique used by cybercriminals to send fraudulent text messages. 

How does SMS spoofing work?

SMS spoofing works by manipulating the sender ID of a text message to make it appear as if it was sent from a different phone number. This can be done using various online services that allow users to send text messages with a fake sender ID. Cybercriminals will change the sender ID to impersonate friends, family, or a legitimate company.

Advertisement

Example of text message screenshot of hacker pretending to be a bank (Kurt “CyberGuy” Knutsson)

It is important to note that SMS spoofing is illegal and can be used for malicious purposes such as phishing scams, identity theft, and fraud. Scammers bank on the combination of familiarity and urgency to get you to interact with their text either by clicking on a link, downloading a file, or responding with personal information.

How to spot and avoid SMS spoofing scams

Here are the top 3 reasons why scammers often send text messages under a fake sender ID with some urgent request:

1. Trick you into clicking on a malicious link that leads you to a malicious website to rob you of your personal or financial information or even unleash malware or viruses to your phone.

Screenshot of text SMS spoof trying to trick you to click a malicious link (Kurt “CyberGuy” Knutsson)

Advertisement

2. Lure you into paying a fake bill under the guise of a reputable or familiar company.

Screenshot of text spoof trying to trick you to pay fake bill (Kurt “CyberGuy” Knutsson)

3. Damages your reputation or relationship with friends, family, and others by sending harmful messages.

Screenshot of text spoof trying to damage your reputation (Kurt “CyberGuy” Knutsson)

iMessage Vulnerabilities

SMS spoof on Apple device from hacker posing as financial institution (Kurt “CyberGuy” Knutsson)

Advertisement

In the past, many Apple devices were considered to be virtually immune to viruses and malware. Unfortunately, due to bugs in iOS, hackers can take over someone’s device just like any other device on the market. While Apple patches these vulnerabilities on a consistent basis, this leaves iPhone users vulnerable to SMS spoofing, too.

A hacker can use “interaction-less” bugs to send a specially crafted SMS message and the iMessage server can send user-specific data, including images or SMS messages, back to them. The user doesn’t even have to open the messages to activate this bug. Additionally, hackers can send malicious codes through texts, embedding them onto the user’s phone. These vulnerabilities are unique to Apple devices.

Aside from the specific vulnerabilities, hackers generally need the user to interact with the text message before the malicious code gets unleashed onto the device.

MORE: CHECK AND DETECT IF SOMEONE YOU KNOW IS SNOOPING ON YOUR IPHONE

7 Actions to take if you suspect SMS spoofing

If you suspect that your phone has been hacked or that someone is impersonating you, it is important to take immediate action. Here are some steps you can take:

Advertisement

1) Have good antivirus software on your phone: Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.

2) Keep your phone software updated: Both iPhone and Android users should keep their phone’s OS and apps updated regularly as Apple and Google release patches to vulnerabilities as they are discovered. Updating your phones can prevent hackers from exploiting security flaws and sending text messages from your phone without you knowing.

3) Change your passwords: Change the passwords for all your online accounts, including your email, social media, and banking accounts. Do not use easy-to-guess information such as your birthday or address. Use strong, unique passwords that are difficult to guess; preferably ones that are alphanumeric and, if applicable, include special symbols. Be sure to do this on another device in case there is malware on your phone monitoring you. Consider using a password manager to generate and store complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.

4) Enable two-factor authentication: Enabling two-factor authentication on all your online accounts will add an extra layer of security to your accounts and make it more difficult for hackers to gain access.

5) Contact your mobile carrier: Contact your mobile carrier and report the incident. They may be able to help you identify the source of the text message and take appropriate action.

Advertisement

6) File a police report: If you believe that you have been a victim of identity theft or fraud, file a police report with your local law enforcement agency.

Fraud detection text message alert on iPhone (Kurt “CyberGuy” Knutsson)

7) Watch your connections: When possible, do not connect to unprotected or public Wi-Fi hotspots or Bluetooth connections. Turn off the Bluetooth connection when not in use. On most iPhones, you can choose who to receive files or photos via AirDrop (a Bluetooth feature) from by selecting to receive from “no one,” people in your Contacts, or Everyone. We suggest you set it to “no one” and only turn it on when you are with the person you are sending or receiving a file or photo from.

MORE: GUARD YOUR PASSWORDS: CHERRYBLOS; FAKETRADE MALWARE THREATEN ANDROIDS

I’ve been scammed by SMS spoofing. What to do next?

Below are some next steps if you find you or your loved one is a victim of identity theft from an SMS spoofing attack.

Advertisement

1) Change your passwords. If you suspect that your phone has been hacked or that someone is impersonating you, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t’ recording you setting up your new password on your hacked device. Use strong and unique passwords that are hard to guess or crack. You can also consider using a password manager to generate and store your passwords securely.

2) Look through bank statements and check account transactions to see where outlier activity started.

3) Use a fraud protection service. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft. 

4) Report any breaches to official government agencies like the Federal Communications Commission.

Advertisement

5) You may wish to get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft, and if being a victim of criminal identity theft leaves you unable to secure employment or housing

6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal. 

8) Alert your contacts. If hackers have accessed your device through SMS spoofing, they could use it to send spam or phishing messages to your contacts. They could impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

9) Restore your device to factory settings. If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original version. You should back up your important data BEFORE doing this, and only restore it from a trusted source.

Advertisement

 If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

MORE: HOW TO TELL IF SOMEONE HAS READ YOUR TEXT MESSAGE

Kurt’s key takeaways

It’s possible for someone who doesn’t have physical possession of your phone to spoof your information for SMS spoofing. Though you might not have control over who gets your number, there are steps you can take to protect yourself.

Have you ever received a convincing text spoof message? What were the telltale signs that it was a spoofed message? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Ideas for using those Holiday Gift cards

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Wisconsin governor says ‘no’ to age checks for porn

Published

on

Wisconsin governor says ‘no’ to age checks for porn

Wisconsin Governor Tony Evers vetoed a bill that would’ve required residents to verify their age before accessing porn sites, as reported earlier by 404 Media. In a letter to the members of the assembly last week, Evers writes that the bill “imposes an intrusive burden on adults who are trying to access constitutionally protected materials.”

The bill (AB 105) would’ve required sites with more than one-third of their total content deemed harmful to minors to impose a “reasonable” form of age verification, such as asking users to show their government-issued ID. More than two dozen states have already passed similar age check requirements for access to adult content, including Arizona, Florida, Georgia, Missouri, Texas, and Virginia. As a result, Pornhub has blocked its site in these locations.

Last month, the Wisconsin American Civil Liberties Union testified that AB-105 “raises significant concerns around privacy, surveillance, and the First Amendment,” and it seems like Governor Evers agreed. “I am vetoing this bill in its entirety because I object to this bill’s intrusion into the personal privacy of Wisconsin residents,” Evers writes, adding that he’s “concerned about data security and the potential for misuse of personally identifiable information” obtained as a result of the age verification process.

An early version of Wisconsin’s age verification bill also included a ban on virtual private networks (VPN), which people have been using to circumvent online age checks. Lawmakers dropped this provision in February, though VPNs are becoming a target for regulators around the globe.

Despite vetoing this bill, Evers is leaving the door open for other kinds of age verification solutions, such as “device-based” methods that would verify the age of users on their phone or computer.

Advertisement
Continue Reading

Technology

Amazon job text scam warning signs

Published

on

Amazon job text scam warning signs

NEWYou can now listen to Fox News articles!

You get a text message. It says Amazon is hiring. The pay sounds great. The work is easy. It feels like a lucky break. Then you read it again. That is when things start to feel off, and you realize it could be a scam. Let’s break down the exact text message scammers are sending and call out every red flag so you know what to watch for next time.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com –  trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.  

YOUTUBE JOB SCAM TEXT: HOW TO SPOT IT FAST
 

A text claiming Amazon is hiring may look convincing at first, but generic wording, unrealistic pay and a missing hiring process are major scam red flags. (Miguel J. Rodriguez Carrillo/Bloomberg via Getty Images)

Advertisement

The biggest red flags in this Amazon job text

Here is what stands out right away in this message.

1) It starts with a generic greeting

The message opens with “Hi” and does not include your name. Legitimate recruiters usually personalize outreach, especially for a job opportunity. A generic greeting suggests this message was sent to many people at once.

2) You did not apply for this job

The message shows up out of nowhere, which should immediately raise concern. In this case, there was no application submitted and no prior contact with a recruiter. Because of that, the outreach feels unexpected and unverified. Legitimate companies do not randomly text people with job offers, especially without any previous interaction.

3) The sender does not match the company

The message comes from a random Hotmail email address, not an official Amazon domain. Real recruiters from Amazon use corporate email accounts tied to Amazon. They do not text you from a generic email or personal number. That alone should stop you in your tracks.

4) The job offer is vague

The role description sounds broad and generic. “Supporting Amazon sellers” and “online tasks” could mean anything. There are no clear responsibilities, no team, no department. Scammers keep things vague on purpose. It helps them reach more people.

Advertisement

5) The pay makes no sense

The message promises $100 to $600 per day for about an hour of work. That is not how legitimate jobs work. When you see high pay for very little effort, that is often bait designed to pull you in fast.

6) The numbers do not add up

It mentions a base pay of $1,000 for every four working days. That conflicts with the daily rate listed earlier. Inconsistent details are a common scam signal. Real job offers are clear and consistent.

7) They push you to respond quickly

The message asks you to text “Interested” to a phone number instead of applying through a formal process. There is no application, no interview and no verification. Because of that, the urgency is intentional and designed to get a fast response before you have time to think it through.

8) The phone number looks unusual or international

The message tells you to text a number like +14482009251. At first glance, it may look like a U.S. number because of the +1 country code. But scammers often use internet-based numbers that can be routed from anywhere. Legitimate recruiters rarely ask you to move a job conversation to a random phone number. If the number feels off, trust that instinct. 

9) The age requirement is unusual

It says, “If you are 25 or older.” That is not a standard hiring requirement for most roles. Random restrictions like this are another sign that something is off.

Advertisement

10) No official hiring process

There is no mention of:

  • A job listing
  • A company’s careers page
  • A recruiter profile
  • An interview

Legitimate companies follow structured hiring steps. They do not skip straight to texting.

SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL
 

Job scammers are now targeting phones with fake Amazon recruiting texts that promise easy remote work and fast money. (Michael Nagle/Bloomberg via Getty Images)

Why this scam works so well

These messages hit a sweet spot for many people. They promise flexible work while also offering remote roles and quick income. As a result, that combination is hard to ignore, especially if you are job hunting. Because of this, scammers design messages that feel like an opportunity rather than a risk.

What this means to you

You are likely to see more messages like this. Job scams have moved from email to text because people respond faster on their phones. That means you need to slow down and question anything that feels too easy or too good. A real opportunity will still be there tomorrow. A scam depends on speed.

Advertisement

We reached out to Amazon about this text message scam, and a spokesperson told us:

“Scammers that attempt to impersonate Amazon put consumers at risk. We will continue to invest in protecting consumers and educating the public on scam avoidance. We encourage consumers to report suspected scams to us so that we can protect their accounts and refer bad actors to law enforcement to help keep consumers safe.”

Ways to stay safe from job text scams

Start with a quick gut check. Then take these steps. 

1) Verify the company directly

Go to the official website of Amazon and check their careers page. If the job is real, it will be listed there. 

2) Do not respond to unknown job texts

Instead, ignore the message completely. Do not text back, click any links or call the number. Even a quick reply can confirm your number is active, which may lead to more scam attempts.

Advertisement

3) Remove your data from broker sites

Scammers often find your number through data broker websites that collect and sell personal information. Using a trusted data removal service can help reduce your exposure by removing your information from hundreds of these sites and lowering the chances of being targeted. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

4) Use strong antivirus protection

If a scam message leads you to a link, your device could be exposed. Strong antivirus software helps block malicious downloads before they cause harm. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

5) Watch for unrealistic pay

High pay for minimal work is one of the biggest warning signs. If it sounds easy, assume there is a catch.

TECH GIANTS UNITE TO FIGHT ONLINE SCAMS
 

If a text promises Amazon work with high pay for little effort, treat it as suspicious and verify the job through official channels. (Jim Young/Bloomberg via Getty Images)

Advertisement

6) Check the sender carefully

Look at the email or phone number. If it is not tied to the company, treat it as suspicious.

7) Protect your personal information

Never share sensitive details like your Social Security number, banking information or ID through text. Real employers use secure systems, not text messages. 

8) Delete and report the message

After you spot the red flags, delete the message right away. In addition, use your phone’s “Report Spam” option to flag it. This helps your carrier and messaging apps identify similar scams and block them for others. Also, Amazon recommends visiting its help pages to find additional information on how to identify scams and report them at amazon.com/ReportAScam.

Kurt’s key takeaways

At first, the message looks polished. It uses a name and references a well-known company while laying out pay and benefits. However, once you slow down, the problems become clear. For example, the greeting is generic, and you never applied. In addition, the sender does not match the company, and the phone number feels off. On top of that, the pay is unrealistic, and the hiring process is missing entirely. This is how most scams work. They depend on speed instead of accuracy.

Have you ever received a job text like this, and what tipped you off that it was a scam? Let us know by writing to us at Cyberguy.com

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com –  trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Suno is a music copyright nightmare

Published

on

Suno is a music copyright nightmare

AI music platform Suno’s policy is that it does not permit the use of copyrighted material. You can upload your own tracks to remix or set your original lyrics to AI-generated music. But, it’s supposed to recognize and stop you from using other people’s songs and lyrics. Now, no system is perfect, but it turns out that Suno’s copyright filters are incredibly easy to fool.

With minimal effort and some free software, Suno will spit out AI-generated imitations of popular songs like Beyoncé‘s “Freedom,” Black Sabbath’s “Paranoid,” and Aqua’s “Barbie Girl” that are alarmingly close to the original. Most people will likely be able to tell the difference, but some could be mistaken for alternate takes or B-sides at a casual listen. What’s more, it’s possible someone could monetize these uncanny valley covers by exporting them and uploading them to streaming services. Suno declined to comment for this story.

Making these covers requires using Suno Studio, available on the company’s $24-a-month Premier Plan. Rather than prompting a whole song with text, Suno Studio lets you upload a track to edit or cover. It’s likely to catch and reject a well-known hit with no tweaks. But using a basic free tool like Audacity to slow down a track to half-speed or speed it up to twice normal will often bypass the filter, and adding a burst of white noise to the start and end seems to basically guarantee success. You can restore the original speed and cut the white noise in Suno Studio, and the copyrighted song becomes the seed for new AI music.

If you generate a cover of the imported audio without any style transfers, Suno basically spits out the original instrumental arrangement with very minimal tweaks to the sound palette if you’re using model 4.5 or 4.5+. Model v5 is a bit more aggressive in taking liberties with the source material, adding chugging guitar and galloping piano to “Freedom” and turning the Dead Kennedys’ “California Über Alles” into a fiddle-driven jig.

Suno lets you add vocals by generating lyrics or typing words into a box, and once again, it’s supposed to block anything copyrighted. If you copy and paste the official lyrics for a song from Genius, Suno will flag them and spit out gibberish vocals. But extremely minor changes can bypass this filter as well.

Advertisement

I was able to trick Suno Studio by tweaking the spelling of a handful of words in “Freedom” — changing “rain on this bitter love” to “reign on” and “tell the sweet I’m new” to “tell the suite” — and beyond the first verse and chorus, I didn’t even need to do that. The voice closely mimics the original recording, summoning slightly off-brand renditions of Ozzy or Beyoncé.

Indie artists might not even be afforded that level of protection. One of my own songs cleared the copyright filter while I was testing v5 of the company’s model. I was also able to get tracks by singer-songwriter Matt Wilson, Charles Bissell’s “Car Colors,” and experimental artist Claire Rousay by Suno’s copyright detection system without any changes at all. Artists on smaller labels or self-distributing through Bandcamp or services like DistroKid are most likely to slip through the cracks; DistroKid and CD Baby declined to comment.

The results of these AI covers fall firmly in the uncanny valley. The songs they’re covering are unmistakable: the riff from “Paranoid” remains identifiable and “Freedom” is obviously “Freedom” from the moment the marching snare hits kick in. But there is a lifelessness to them. Even if AI Ozzy is alarmingly accurate-sounding, it lacks nuance and dynamics, leading it to feel like an imitation of a human, rather than the real thing.

The instrumentals similarly discard any interesting artistic choices the originals make, or clone them in flat imitations. A non-jig “California Über Alles” cover has most of its rough edges sanded down so it sounds like a wedding band version of the original. Pink Floyd’s “Another Brick in the Wall” goes from an experiment in doom disco to just vacuous dancefloor filler. And, while it kind of nails David Gilmour’s guitar tone, it does away with any sense of phrasing or progression, turning the solo into just a mindless stream of notes.

Creating unauthorized covers violates both the stated purpose of Suno, and the terms of service. Moreover, Suno only appears to scan tracks on upload; it doesn’t seem to recheck outputs for potential infringement, or rescan tracks before exporting them. The path to monetizing Suno-created covers is simple from there. AI slopmongers could upload them through a distribution service like DistroKid and profit from other people’s songs without paying the typical royalties a cover would give the original composer. And independent artists seem to be the most vulnerable.

Advertisement

Folk artist Murphy Campbell discovered this recently when someone uploaded what seem to be AI covers of songs she posted on YouTube to her Spotify profile. (It’s not clear what system they were generated through.) Shortly afterwards, distributor Vydia filed copyright claims against her YouTube videos and began collecting royalties on them. And to highlight just how broken the whole system is, the songs which Vydia successfully filed copyright claims for are all in the public domain. Spotify eventually removed the AI covers, and Vydia has rescinded its copyright claims, but that only happened following a social media campaign by Campbell. Vydia says the two incidents are separate and it is not associated with the AI covers of Campbell’s work.

AI fakes are a problem for other artists too. Experimental composer William Basinski and indie rock group King Gizzard and The Lizard Wizard have had imitations slip through multiple filters and reach streaming platforms like Spotify. Sometimes, these fake songs can siphon up views straight from the artist’s own page. In a system where payouts can already be brutally low — Spotify requires a minimum of 1,000 streams to get paid — less famous musicians are hit hardest.

Suno is only one cog in a clearly broken system.

Services like Deezer, Qobuz, and Spotify have taken measures to combat spammy AI and impersonators. Spotify spokesperson Chris Macowski told The Verge that the company “takes protecting artists’ rights seriously, and approaches it from multiple angles. That includes safeguards to help prevent unauthorized content from being uploaded in the first place, along with systems that can identify duplicate or highly similar tracks. Those systems are backed by human review to make sure we’re getting it right.” But no system is perfect, and keeping up with a flood of AI slop enabled by platforms like Suno poses a challenge.

Macowski acknowledged the technical difficulties involved, saying, “It’s an area we’re continuing to invest in and evolve, especially as new technologies emerge.”

Advertisement

Suno is only one cog in a clearly broken system. But it’s one artists have particularly little recourse to fight. Bands can contact Spotify and have AI fakes removed from their profile. It’s harder to tell how those fakes are generated, and if they’re the result of Suno’s filters failing. And so far, Suno’s response is silence.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Trending