1) Man-in-middle Attack: This is the network that authenticates users. The user does not authenticate network
so the attacker can use a false BTS with the same mobile network code as the subscriber's legitimate network to
impersonate himself and perform a man-in-the-middle attack.
2) Replay Attack: The attacker can misuse the previously exchanged messages between the subscriber and
network in order to perform the replay attacks.
3) Message Disclosure: Since encryption is not applied to short message transmission by default, messages
could be intercepted and snooped during transmission. In addition, SMS messages are stored as plain text by the
SMSC before they are successfully delivered to the intended recipient. These messages could be viewed by users
in the SMSC who have access to the messaging system.
4) Spamming: While using SMS as a legitimate marketing channel, many people have had the inconvenience
of receiving SMS spam. The availability of bulk SMS broadcasting utilities makes it easy for virtually everyone
to send out mass SMS messages.
5) Denial of Service (DoS) Attacks: DoS attacks are made possible by sending repeated messages to a target
mobile phone, making the victim’s mobile phone inaccessible.
6) SMS Phone Crashes: Some vulnerable mobile phones may crash if they receive a particular type of
malformed short message. Once a malformed message is received, the infected phone becomes inoperable.
7) SMS Viruses: There have been no reports of viruses being attached to short messages, but as mobile
phones are getting more powerful and programmable; the potential of viruses being spread through SMS is
becoming greater.
8) SMS Phishing: SMS phishing is a combination of SMS and phishing. Similar to an Internet phishing attack
using email, attackers are attempting to fool mobile phone users with bogus text messages. When users are taken
in by a bogus text message, they may connect to a website provided in the SMS message, and be tricked into
download a malware application into their mobile phones.