The post $80 Billion Lost to SMS Fraud Last Year. The Good News Is Wrong. appeared first on Constella Intelligence.
Mobile fraud losses are projected to decline in 2026. That headline is technically accurate and deeply misleading. The fraud is not going away. It is changing channels, picking up speed, and getting harder to stop.
The number looks like progress. Global subscriber losses from SMS fraud, smishing, account takeover, and related mobile threats reached $80 billion in 2025. In 2026, analysts project that figure will fall to $71 billion, an 11% decline.
Before your fraud or security team updates its risk posture based on that trajectory, it is worth understanding what is actually driving the drop, and what the headline does not capture.
The decline in raw SMS fraud losses reflects one thing: SMS as a channel is becoming less attractive to attackers. Message volumes are declining, carrier-level firewalls are getting better at blocking known smishing domains, and regulators in the U.S. and internationally are applying pressure on telecom operators to improve filtering. The result is that concealing fraudulent traffic in legitimate SMS traffic is becoming more expensive and more detectable for the criminal organizations running smishing operations at scale.
None of that means the fraud operators are shutting down. It means they are moving.
The infrastructure behind large-scale mobile fraud campaigns, the Phishing-as-a-Service platforms, the affiliate networks, the SIM farms, the automated credential harvesters, is not being dismantled. It is being redirected to channels where carrier-level filters cannot reach.
iMessage and RCS are the new delivery infrastructure. Sophisticated PhaaS platforms including Darcula and Lucid, both linked to Chinese-speaking criminal networks, have largely shifted from SMS to Apple iMessage and Google’s Rich Communication Services protocol. The reason is structural: iMessage and RCS use end-to-end encryption, which makes it impossible for network operators to inspect or filter message content. Carrier spam controls that block known smishing domains are useless when they cannot read the message. Legitimate-looking blue bubbles from unknown email addresses now carry phishing links to 100-plus countries.
WhatsApp and Telegram carry the personalized campaigns. When attackers have high-quality PII, such as the reservation data from the recent Booking.com breach, the travel records from aviation sector breaches, or the financial transaction data from banking sector compromises, they use it to build targeted campaigns on trusted messaging platforms. A WhatsApp message that correctly names your hotel, your check-in date, and your booking reference number bypasses the instinct that flags generic smishing. These campaigns are not high-volume spray attacks. They are precision strikes built from breached data.
AI is eliminating the quality floor. The tell-tale signs that historically helped recipients identify smishing, awkward phrasing, grammatical errors, generic lures, are disappearing. AI-powered phishing kit updates have given even low-skill operators the ability to generate grammatically perfect, locally contextualized, brand-accurate messages in any language, at scale, in minutes. AI-powered smishing campaigns are now achieving click-through rates of up to 54%. The gap between AI-generated smishing and legitimate mobile communication is closing rapidly.
The monetization pipeline is automated and real-time. Modern PhaaS platforms stream victim-entered data to operators character by character as the victim types, including card numbers, PINs, and one-time codes. Stolen card data is verified against bank systems automatically and in real time. The entire chain from a victim clicking a link to fraudulent card provisioning to a digital wallet can complete in under three minutes. The $800 average financial loss per smishing victim understates the downstream fraud value of a single successful credential capture.
The channel migration from SMS to encrypted messaging and AI-personalized lures affects every sector that holds personal data, processes payments, or communicates with customers through mobile channels. The attack surface is not sector-specific. The data that fuels the campaigns is.
The reason smishing is becoming more effective, even as it declines in raw SMS volume, is the quality of the underlying identity data powering the campaigns. That data comes from breaches. It comes from infostealer logs. It comes from the PII-rich breach records that Constella’s 2026 Identity Breach Report documents surging 661% year over year in 2025.
Ian Matthews, founder of WMC Global and one of the practitioners joining the April 30 webinar, spends his days tracing exactly this chain: how data that originates in a breach or an infostealer infection eventually surfaces in a mobile fraud campaign. His background building SMS interconnect infrastructure gives him a unique view into how the routing and delivery side works. His current work focuses on detecting, disrupting, and attributing the mobile fraud operations that sit downstream of the identity exposure Constella monitors.
The connection between the two is not incidental. It is the operational reality of how modern mobile fraud works. Attackers do not generate their own targeting data. They buy it, harvest it from phishing campaigns, or extract it from breach packages circulating in underground markets. Constella’s monitoring of those markets, across 54.6 billion curated records spanning 125 countries, is the early warning system that identifies when a specific organization’s customer or employee data has entered the adversary ecosystem, before it fuels the next wave of campaigns.
The migration of mobile fraud from SMS to encrypted channels, the industrialization of PhaaS infrastructure, and the role of breached identity data in fueling targeted campaigns are exactly the topics the Constella smishing and mobile fraud webinar was built to address.
On April 30 at 1:00 PM ET, Ian Matthews of WMC Global, Josh Swenson of the Oklahoma Turnpike Authority, and the Constella Intelligence team will cover how this threat pipeline actually works, what it looks like from the practitioner side of both financial fraud and critical infrastructure, and what organizations across every vertical can do to get ahead of it.
If mobile fraud, smishing, or the role of identity exposure in downstream campaigns is relevant to your organization, this is the conversation worth having.
Register for the Smishing and Mobile Fraud Webinar — April 30, 1:00 PM ET
Sources: Infosecurity Magazine (March 18, 2026); Infobip SMS Fraud Guide (April 2026); Keepnet Smishing Statistics (March 2026); Bank Policy Institute (February 2026); FBI IC3 PSA (April 2024); FTC text scam data (2024). Statistics: Constella Intelligence 2026 Identity Breach Report.
*** This is a Security Bloggers Network syndicated blog from Constella Intelligence authored by Christine Castro. Read the original post at: https://constella.ai/blog/80-billion-lost-to-sms-fraud-last-year-the-good-news-is-wrong/