{"id":8297,"date":"2022-11-17T13:11:56","date_gmt":"2022-11-17T21:11:56","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=8297"},"modified":"2024-04-26T13:19:59","modified_gmt":"2024-04-26T20:19:59","slug":"french-smishing-campaign-uses-fake-social-security-portal","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/","title":{"rendered":"French Smishing Campaign Uses Fake Social Security Portal"},"content":{"rendered":"<h3><strong>Author: Ma\u00ebl Le Touz<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Overview<\/h3>\n<p>Since late August, Infoblox has been tracking an actor sending a large number of SMS phishing (smishing) messages targeting phone numbers in France. This attack is ongoing and so widespread that it is regularly mentioned in national news.<sup>1<\/sup> The text requests that the addressee fill out a form to receive a new Social Security Card and to keep the addressee\u2019s healthcare plan. Threat actors then charge victims\u2019 bank accounts and later make fraudulent tax claims.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/french-smishing-campaign-uses-fake-social-security-portal-1.png\" \/><br \/>\nFigure 1: An example of an inbound smishing message, received on 14 October. <\/p>\n<h3>2. Customer Impact<\/h3>\n<p>This campaign was first discovered in relation to Ameli: the French government&#8217;s portal for social security, and one of the single sign-on (SSO) points for other websites of government services. The campaign is focused on French speakers and French nationals who use government services and banks. However, some related domains used also include lookalikes that target British nationals, Spanish and Portuguese speakers, as well as Belgian telco and Dutch energy companies. See Figures 2 and 3 below.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/french-smishing-campaign-uses-fake-social-security-portal-2.png\" \/><br \/>\nFigure 2: An example of a phishing page masquerading as the portal for the website for S\u00e9curit\u00e9 Sociale<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/french-smishing-campaign-uses-fake-social-security-portal-3.png\" \/><br \/>\nFigure 3: Example of a phishing page targeting customers of the Caisse d&#8217;Epargne bank<\/p>\n<p>Once the landing page is accessed, the victim is served with a form asking for personal information, such as email addresses and passwords. The fraudulent websites also ask for financial information, purportedly to allow for the payment of taxes or late fees. If the victim fills out those forms, their bank accounts will be immediately charged. Some time later, when tax season comes, the victims\u2019s Ameli login will be used to make fraudulent tax claims and receive tax rebates on an attacker-controlled bank account.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/french-smishing-campaign-uses-fake-social-security-portal-4.png\" \/><br \/>\nFigure 4: Most commonly used words in the domain names<\/p>\n<h3>4. Infrastructure analysis<\/h3>\n<p>Attackers used an extensive network of burner emails, phone numbers, and fake identities to cover their tracks, as well as used multiple hosts to avoid automatic takedowns. After several days, the attackers took the phishing pages offline to avoid detection by automated tools and browser safety lists. Infoblox was able to detect and identify approximately 200 IP addresses serving over 7,000 unique phishing domains, illustrated in the map in Figure 5 below. Although the attackers have used Amazon, Google, and other providers of cloud services, they also rely heavily on dedicated servers.<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/french-smishing-campaign-uses-fake-social-security-portal-5.png\" \/><br \/>\nFigure 5: The number of dedicated hosting IPs used by the actors, per country<\/p>\n<p>The landing pages are of good quality and, to the unsuspecting eye, visually indistinguishable from the legitimate login pages. Some phishing pages ask for credit card information, purportedly to pay taxes or resolve an unsuccessful payment to a legitimate service. Using Ameli, one can log in to a variety of government portals, including the tax office and the portal for government subsidies. This has led the government of France to temporarily cut off access from it.<sup>2<\/sup> Nevertheless, we consider this attack as more likely to be financially motivated rather than political, because it has targeted multiple sectors &#8211; government, financial, energy and communication &#8211; in several countries.<\/p>\n<h3>5. Vulnerabilities and Mitigation<\/h3>\n<p>Infoblox strongly recommends that businesses consider the following security measures:<\/p>\n<ul>\n<li>Never click URLs in emails or texts from unknown sources.<\/li>\n<li>Be wary of links in incoming emails and texts. A link in a message from a legitimate company will usually point to the company\u2019s domain; for example, a link in a message from FedEx will point to http:\/\/fedex[.]com. Pause the cursor over the link to verify its true destination.<\/li>\n<li>If in doubt, do not click links in messages. Instead, navigate to the websites by typing their URLs in the web address bar of your browser.<\/li>\n<\/ul>\n<h3>Appendix<\/h3>\n<p>The table below provides a list of the indicators or compromise (IOCs) relevant to our recent findings. For the complete list of IoCs, see our GitHub repository.<sup>3<\/sup><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Representative Indicators of Compromise<\/b><\/td>\n<td><b>Description<\/b><\/td>\n<\/tr>\n<tr>\n<td>remboursement-impot-fiscal[.]com<\/p>\n<p>connexion-ligne[.]com<\/p>\n<p>cartevitale-info-ameli[.]com<\/p>\n<p>cartevitale-actualisation[.]com<\/p>\n<p>authentification-carte-vitale-secure[.]com<\/p>\n<p>auth-secure-carte-vitale[.]com<\/p>\n<p>assurevitale[.]com<\/p>\n<p>assurance-cartes[.]com<\/p>\n<p>netflix-secu[.]com<\/p>\n<p>ameli-monrenouvellement[.]com<\/p>\n<p>votre-envoi-colis[.]com<\/p>\n<p>authentification-ameli-secure[.]com<\/p>\n<p>authameli[.]com<\/p>\n<p>auth-carte-vitale-connexion[.]com<\/p>\n<p>assurvital[.]com<\/p>\n<p>vitale-carte-actualisation[.]com<\/p>\n<p>secur-amelie[.]com<\/p>\n<p>ma-vitale-sante[.]com<\/p>\n<p>ma-cledigitale-support[.]com<\/p>\n<p>gouv-reduction-impot[.]com<\/p>\n<p>digitale-support[.]com<\/p>\n<p>auth-connexion-service-public[.]com<\/p>\n<p>ameli-frais[.]com<\/td>\n<td>Sample of phishing domains<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Endnotes<\/h3>\n<ol>\n<li><strong><a href=\"https:\/\/www.bfmtv.com\/tech\/cybersecurite\/carte-vitale-les-arnaques-a-l-assurance-maladie-par-sms-se-multiplient_AN-202210240473.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.bfmtv.com\/tech\/cybersecurite\/carte-vitale-les-arnaques-a-l-assurance-maladie-par-sms-se-multiplient_AN-202210240473.html<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.impots.gouv.fr\/actualite\/suspension-de-la-connexion-nos-services-pour-les-usagers-utilisant-leur-compte-ameli-sur\" target=\"_blank\" rel=\"noopener\">https:\/\/www.impots.gouv.fr\/actualite\/suspension-de-la-connexion-nos-services-pour-les-usagers-utilisant-leur-compte-ameli-sur<\/a><\/strong><\/li>\n<li><a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\/tree\/main\/cta_indicators\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/github.com\/infobloxopen\/threat-intelligence\/tree\/main\/cta_indicators<\/strong><\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Ma\u00ebl Le Touz &nbsp; 1. Overview Since late August, Infoblox has been tracking an actor sending a large number of SMS phishing (smishing) messages targeting phone numbers in France. This attack is ongoing and so widespread that it is regularly mentioned in national news.1 The text requests that the addressee fill out a form [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":8299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[779,658,657,777,778,782,780,781],"class_list":{"0":"post-8297","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-cti","9":"tag-cyber-threat-advisory","10":"tag-cyber-threat-intelligence","11":"tag-smishing","12":"tag-sms-phishing","13":"tag-threat-analysis","14":"tag-threat-intel","15":"tag-tig","16":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>French Smishing Campaign Uses Fake Social Security Portal | Infoblox<\/title>\n<meta name=\"description\" content=\"Since August, Infoblox has tracked an actor sending a large number of SMS phishing messages targeting phone numbers in France. Learn more in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"French Smishing Campaign Uses Fake Social Security Portal\" \/>\n<meta property=\"og:description\" content=\"Since August, Infoblox has tracked an actor sending a large number of SMS phishing messages targeting phone numbers in France. Learn more in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T21:11:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:19:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-07.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"French Smishing Campaign Uses Fake Social Security Portal\",\"datePublished\":\"2022-11-17T21:11:56+00:00\",\"dateModified\":\"2024-04-26T20:19:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/\"},\"wordCount\":727,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-07.jpg\",\"keywords\":[\"CTI\",\"Cyber Threat Advisory\",\"Cyber Threat Intelligence\",\"Smishing\",\"SMS phishing\",\"Threat analysis\",\"Threat Intel\",\"TIG\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/\",\"name\":\"French Smishing Campaign Uses Fake Social Security Portal | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-07.jpg\",\"datePublished\":\"2022-11-17T21:11:56+00:00\",\"dateModified\":\"2024-04-26T20:19:59+00:00\",\"description\":\"Since August, Infoblox has tracked an actor sending a large number of SMS phishing messages targeting phone numbers in France. Learn more in this article.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-07.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cti-image-07.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/french-smishing-campaign-uses-fake-social-security-portal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"French Smishing Campaign Uses Fake Social Security Portal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"French Smishing Campaign Uses Fake Social Security Portal | Infoblox","description":"Since August, Infoblox has tracked an actor sending a large number of SMS phishing messages targeting phone numbers in France. Learn more in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/","og_locale":"en_US","og_type":"article","og_title":"French Smishing Campaign Uses Fake Social Security Portal","og_description":"Since August, Infoblox has tracked an actor sending a large number of SMS phishing messages targeting phone numbers in France. Learn more in this article.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/","og_site_name":"Infoblox Blog","article_published_time":"2022-11-17T21:11:56+00:00","article_modified_time":"2024-04-26T20:19:59+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-07.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"French Smishing Campaign Uses Fake Social Security Portal","datePublished":"2022-11-17T21:11:56+00:00","dateModified":"2024-04-26T20:19:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/"},"wordCount":727,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-07.jpg","keywords":["CTI","Cyber Threat Advisory","Cyber Threat Intelligence","Smishing","SMS phishing","Threat analysis","Threat Intel","TIG"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/","name":"French Smishing Campaign Uses Fake Social Security Portal | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-07.jpg","datePublished":"2022-11-17T21:11:56+00:00","dateModified":"2024-04-26T20:19:59+00:00","description":"Since August, Infoblox has tracked an actor sending a large number of SMS phishing messages targeting phone numbers in France. Learn more in this article.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-07.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cti-image-07.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/french-smishing-campaign-uses-fake-social-security-portal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"French Smishing Campaign Uses Fake Social Security Portal"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=8297"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8297\/revisions"}],"predecessor-version":[{"id":8309,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/8297\/revisions\/8309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8299"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=8297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=8297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=8297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}