In 2023, Americans lost $5.8 billion to text message-based financial fraud—a staggering reminder that our most common form of digital communication may also be our most vulnerable. While text messaging has become the default method for sharing everything from dinner plans to bank account details, the question “is it safe to send sensitive information by text” has never been more critical to answer.
The reality is stark: standard SMS messages offer virtually no protection for your sensitive data. Unlike secure messaging apps that encrypt your communications, text messages travel as readable text through multiple networks, creating numerous opportunities for cybercriminals to intercept your most confidential information.
This comprehensive guide examines why text message security falls short of modern standards, explores the cyber threats targeting SMS communications, and provides practical alternatives to protect your sensitive information from unauthorised access.
When evaluating whether it’s safe to send sensitive information by text, security experts universally agree: standard SMS messages are fundamentally insecure for transmitting confidential data. Text messaging security relies on outdated protocols from the 1990s that lack the robust encryption standards required to protect sensitive data in today’s threat landscape.
Major data breaches continue to expose the vulnerabilities in our messaging infrastructure. The 2023 T-Mobile breach alone compromised personal data from at least 37 million customer accounts, including information contained in SMS traffic. This incident highlights how text message communications can become gateways for cybercriminals to gain unauthorised access to customer data across entire networks.
Financial institutions and healthcare providers specifically warn against using SMS messaging for transmitting regulated information. Industry standards like HIPAA, PCI DSS, and GDPR either restrict or explicitly prohibit SMS use for sensitive data transmission. According to Federal Trade Commission guidance, legitimate banks and businesses will never request sensitive account information via text message, underscoring both the security risks and the prevalence of SMS-based fraud targeting consumers.
The infrastructure supporting SMS transmission simply wasn’t designed with modern security threats in mind. While websites use HTTPS encryption with 256-bit security protocols, text messages travel as plain text through carrier networks without any encryption protection.
Understanding the technical limitations of SMS helps explain why sending sensitive information by text exposes you to significant network security risks. The short message service protocol operates through telecommunications infrastructure that treats security as an afterthought rather than a core feature.
The fundamental flaw in SMS security lies in its complete lack of encryption. When you send a text message, the content travels as readable text from your mobile device through multiple network hops to reach the intended recipient. This stands in stark contrast to secure communication channels that employ end-to-end encryption to protect data in transit.
While modern web browsers automatically encrypt connections using TLS protocols with 256-bit encryption, SMS relies on decades-old technology that predates current security standards. Your text message content remains accessible to anyone with access to the telecommunications backbone, carrier networks, or compromised devices at either endpoint.
Even after you delete messages from your mobile devices, the content often persists on carrier servers for weeks or months. This extended storage creates additional opportunities for malicious content to be exposed during data breaches or through unauthorised parties gaining access to carrier infrastructure.
Every text message follows a complex journey that creates numerous vulnerabilities. The path from your mobile device to the recipient’s device typically involves 4–6 distinct transmission points: your device to the nearest cell tower, through your carrier’s network infrastructure, across any intermediary carrier networks, and finally to the recipient’s device.
Each of these network hops represents a potential point where unauthorised parties can intercept your communications. The 2022 FBI warning about SS7 (Signalling System 7) network vulnerabilities specifically highlighted how the foundational protocols supporting SMS transmission remain susceptible to exploitation by both criminal actors and government surveillance programmes.
Security researchers at DEF CON 2023 demonstrated these vulnerabilities in practice, successfully intercepting over 10,000 SMS messages using readily available equipment. The demonstration showed how attackers can position themselves between network infrastructure components to capture text message communications without the knowledge of either the sender or intended recipient.
The prevalence of SMS-based attacks has grown significantly as cybercriminals recognise the inherent weaknesses in text messaging security. These attacks exploit the lack of access controls and encryption in standard messaging protocols to extract sensitive information from unsuspecting victims.
SIM swapping represents one of the most damaging attacks targeting text message communications. In these social engineering attacks, criminals convince mobile carriers to transfer a victim’s phone number to a new SIM card under the attacker’s control. Once successful, the attacker gains access to all SMS messages, including two-factor authentication codes and password reset messages.
The March 2024 Verizon incident exemplified how even major carriers remain vulnerable to these attacks. Criminals used social engineering techniques to convince customer service representatives to authorise SIM transfers, giving them control over victims’ phone numbers and access to their digital accounts.
According to FBI Internet Crime Complaint Center data, SIM swapping attacks cost US victims over $500 million in 2023 alone. High-profile cases include the 2019 attack on Twitter CEO Jack Dorsey, where criminals gained control of his phone number to post unauthorised content to his social media accounts. These attacks often target individuals with significant cryptocurrency holdings or business executives with access to valuable customer data.
The average victim requires six months to fully resolve the impacts of a successful SIM swap attack, during which time criminals may continue to exploit compromised accounts and drain financial resources.
Smishing attacks leverage the trusted nature of text messaging to deliver malicious content directly to victims’ mobile devices. These attacks increased by 146% during the 2023 holiday shopping season, as criminals capitalised on increased online shopping activity to send fake delivery notifications and promotional offers.
Typical smishing messages appear to come from trusted institutions like banks, retailers, or service providers. They often include urgent language designed to pressure recipients into clicking malicious links or providing login credentials. Once victims click these links, they may download malware to their mobile device or be redirected to credential harvesting websites designed to steal passwords and account information.
Business organisations report that 76% experienced targeted smishing attempts in 2023, with attacks becoming increasingly sophisticated in their targeting and execution. Criminals now use publicly available information to personalise their attacks, referencing specific account details or recent transactions to increase credibility.
The financial impact extends beyond individual victims. Businesses face liability when customer data is compromised through SMS-based attacks, with average incident response costs reaching thousands of dollars per affected customer.
Attackers can position themselves between your mobile device and cellular networks to intercept text message communications in real-time. These man-in-the-middle attacks often use specialised equipment like IMSI catchers (commonly known as “StingRays”) that mimic legitimate cell towers to capture SMS traffic from nearby devices.
Law enforcement agencies routinely use these tools for legitimate surveillance purposes, but the same technology is available to criminal actors. During the 2023 DEF CON security conference, researchers demonstrated how relatively inexpensive equipment could intercept thousands of text messages in urban environments where many mobile devices are present.
Public Wi-Fi networks create additional opportunities for these attacks, particularly when messaging apps fall back to SMS delivery in areas with poor data connectivity. Attackers monitoring Wi-Fi traffic can potentially capture messages that would otherwise be protected by app-level encryption.
The sophistication of these attacks continues to increase, with criminals developing more portable and powerful interception equipment that can target specific individuals or capture broad swathes of communications in high-traffic areas.
Regulatory guidance from financial and healthcare industries provides clear direction on what types of sensitive information should never be transmitted through standard SMS messaging. The lack of security protocols in text messaging makes certain categories of data particularly vulnerable to exploitation.
Never send any financial data through text messages, including credit card details, bank account numbers, routing information, ATM PINs, or investment account credentials. The Federal Trade Commission explicitly states that legitimate financial institutions will never request this information via text message, making any such request a clear indicator of fraud.
The $5.8 billion lost to SMS-based financial fraud in 2023 demonstrates the scale of risk associated with sharing financial data through insecure channels. When criminals gain access to credit card details or bank account information, victims face average losses of $1,100 per incident and require approximately six months to fully resolve the financial and credit impacts.
Social Security numbers and tax identification numbers are particularly valuable to criminals, as they enable comprehensive identity theft that can persist for years. The 298 million Americans affected by identity theft in 2023 faced not only immediate financial losses but ongoing challenges with credit reporting, fraudulent account openings, and legal complications.
Banking regulations under PCI DSS specifically prohibit transmitting credit card information through unencrypted channels like SMS. Organisations that fail to protect customer financial data face regulatory fines averaging millions of dollars, in addition to the direct costs of breach remediation and customer notification.
Avoid texting any government-issued identification numbers, including driver’s licence numbers, passport details, or state ID information. Even seemingly harmless information like photos of official documents can provide criminals with sufficient detail to enable unauthorised access to accounts or services.
Identity theft resolution requires an average of six months and costs victims approximately $1,100 in direct expenses, excluding lost time and ongoing monitoring costs. The complexity of modern identity verification systems means that criminals with access to key identification details can often bypass security questions and authentication processes designed to protect accounts.
Healthcare records and medical information face particular protection under HIPAA regulations, which explicitly prohibit transmission of protected health information through unencrypted messaging channels. Healthcare providers risk substantial regulatory penalties for SMS transmission of patient data, with fines potentially reaching millions of dollars for large-scale violations.
The interconnected nature of modern data systems means that compromise of personal identification information often leads to cascading security failures across multiple accounts and services. Criminals use stolen identification data to apply for new credit accounts, access existing financial services, and even obtain government benefits under victims’ names.
Business communications containing customer data, proprietary information, trade secrets, or employee records should never be transmitted through standard text messaging. The lack of access controls in SMS means that confidential business information remains vulnerable throughout its transmission and storage lifecycle.
Corporate data breaches cost organisations an average of $4.45 million per incident according to IBM’s 2023 Cost of a Data Breach Report. When businesses fail to protect customer data transmitted through insecure channels like SMS, they face not only direct remediation costs but also regulatory penalties, legal liability, and long-term damage to consumer trust.
GDPR violations related to inadequate data protection reached €1.2 billion in fines across EU organisations in 2023. The regulation’s strict requirements for data protection extend to all forms of electronic communication, making SMS transmission of personal data a significant compliance risk for international businesses.
Intellectual property and trade secrets transmitted through unsecured channels may lose their protected status under trade secret laws. Courts have ruled that businesses must take reasonable steps to protect confidential information, and using unencrypted messaging for sensitive communications may demonstrate inadequate protection measures.
To protect your communications, consider upgrading to a secure messaging app such as Cellcrypt. Unlike standard SMS, Cellcrypt utilises military-grade end-to-end encryption, ensuring that only you and your intended recipient can read the messages. This encryption is applied before messages leave your device and is only removed once they reach the recipient’s device, preventing interception at every step.
While other secure messaging apps exist, Cellcrypt is designed for environments where data protection is paramount. It offers a level of encryption and control that many consumer-focused alternatives do not, making it ideal for individuals and organisations that handle highly sensitive information.
When text messaging isn’t sufficient, encrypted voice and video calls provide secure alternatives for sensitive conversations. Cellcrypt offers encrypted calling with the same level of encryption used for Cellcrypt text messaging, ensuring that even voice communications remain protected from unauthorised access.
The encryption provided by Cellcrypt far exceeds the security provided by traditional phone calls or SMS, making them appropriate choices for discussing sensitive business or personal information.
While secure messaging apps, such as Cellcrypt, provide the best protection for sensitive information, situations may arise where SMS use becomes necessary. Implementing proper security measures can help limit access to your communications and reduce the risk of unauthorised parties gaining access to your messages.
Android users can enable RCS (Rich Communication Services) messaging through the Google Messages app to add basic encryption when communicating with other RCS-enabled devices. While not as robust as dedicated encrypted messaging apps, such as Cellcrypt, RCS provides improved security compared to standard SMS protocols.
iPhone users should ensure iMessage is enabled and verify encryption status before sending potentially sensitive information. The blue message bubbles indicate end-to-end encrypted iMessage communication, while green bubbles represent unencrypted SMS that lacks security protocols.
Enable strong authentication on your mobile device using biometric options or complex PINs to limit access if your device is lost or stolen. A six-digit PIN provides significantly better protection than four-digit codes, while biometric authentication offers convenience without compromising security.
Turn off message previews on your lock screen to prevent unauthorised parties from reading message content without unlocking your device. This simple configuration change prevents shoulder surfing attacks and protects message privacy in public settings.
Set automatic screen timeouts to 30 seconds or less to ensure your device locks quickly when not in use. Combined with strong authentication, this prevents unauthorised access during brief moments when you’re separated from your mobile device.
Enable remote wipe capabilities through Find My iPhone or Android Device Manager to protect your data if your device is lost or stolen. These features allow you to securely erase sensitive information before unauthorised parties can gain access to your communications and accounts. You can also remotely wipe the data within the Cellcrypt app via its centralised administration portal, the Cellcrypt Enterprise Management Portal (EMP).
Never click links from unknown numbers or respond to urgent-sounding messages requesting sensitive information. Legitimate organisations use secure communication channels for sensitive requests and will never ask for confidential data through unsolicited text messages.
Verify sender identity through separate communication channels before responding to any request for sensitive information. If someone claiming to be from your bank sends a text message, call the official customer service number to confirm the authenticity of the communication.
Report suspicious messages to 7726 (SPAM) as recommended by major carriers to help identify and block fraudulent communications. This reporting helps protect other users from similar attacks and assists law enforcement in tracking criminal activity.
Delete suspicious messages immediately without opening attachments or clicking links. Many smishing attacks rely on users’ curiosity or urgency to bypass normal security precautions and expose their devices to malware or credential theft.
While secure messaging apps provide superior protection for sensitive data, certain limited scenarios may justify SMS use when the convenience and universal accessibility outweigh minimal security risks. These situations require careful risk assessment and appropriate safeguards.
Meeting confirmations, appointment reminders, and delivery notifications typically contain information that poses minimal risk if intercepted. These communications often involve publicly available information or temporary details with limited value to malicious actors.
Temporary access codes with short expiration times (under 10 minutes) may be acceptable for SMS delivery in situations where secure alternatives aren’t available. However, enable two-factor authentication through dedicated authenticator apps whenever possible, as these provide better security than SMS-based codes.
Communications containing only public information or details already available through other channels present reduced risk when transmitted through SMS. Event announcements, business hours, or general promotional information lack the sensitivity that makes other communications attractive targets for cybercriminals.
Consider the overall risk profile when convenience significantly outweighs the minimal security concerns. Restaurant reservations or appointment scheduling may justify SMS use when the information has limited value and the convenience enables important communications.
Natural disasters and emergency situations may compromise secure communication infrastructure while leaving SMS networks operational. FEMA specifically recommends SMS for emergency alerts because text messaging often remains functional when voice and data networks become congested or damaged.
Medical emergencies where immediate communication can save lives may justify the use of available communication channels, including SMS. In these situations, the immediate risk to health and safety outweighs the potential security risks associated with text messaging.
However, even emergency communications should avoid including sensitive personal information when possible. Focus on essential coordination details rather than transmitting identification numbers, medical records, or other confidential data that could be exploited later.
Develop backup communication plans that prioritise secure channels while identifying acceptable fallback options for critical situations. This planning ensures that emergency communications can proceed while maintaining appropriate security measures whenever possible.
Include risk assessment frameworks in business continuity planning to guide communication decisions during crisis situations. These frameworks help organisations balance the need for immediate communication against the potential liability from inadequate data protection.
The question “is it safe to send sensitive information by text” has a clear answer: standard SMS messaging lacks the security protocols necessary to protect confidential data in today’s threat landscape. With $5.8 billion lost to SMS-based fraud in 2023 and major data breaches exposing millions of text message communications, the risks of using unencrypted messaging for sensitive information far outweigh any convenience benefits.
The technical limitations of SMS—including the lack of encryption, multiple interception points, and vulnerable network infrastructure—make it wholly unsuitable for transmitting financial information, personal identification data, or confidential business communications. Regulatory guidance from HIPAA, PCI DSS, and GDPR specifically warns against SMS use for protected information, with substantial penalties for organisations that fail to implement appropriate security measures.
Secure messaging apps like Cellcrypt offer practical alternatives that provide the same convenience as SMS while implementing end-to-end encryption and other security protocols necessary to protect sensitive data.
The convenience of SMS texting doesn’t justify the security risks when handling sensitive information. Whether you’re sharing financial details, personal identification, or confidential business data, choosing secure messaging platforms protects both your privacy and the trust of those who depend on you to safeguard their information. Make the switch to encrypted messaging for anything confidential—your security and peace of mind depend on it.
As we peer into this future, it's crucial to understand where we've been, where we are, and where we're headed in the realm of encryption. Let's embark on a journey through the history of encryption and explore how it's adapting to face the quantum challenge.
In 2025, sending files securely is no longer optional—it's essential. Whether you're sharing legal contracts, personal records, business plans, or financial data, unencrypted documents are vulnerable to breaches, interception, and accidental leaks.
In recent months, a hacking group known as "Salt Typhoon" has infiltrated several U.S. internet and telecoms service providers, including major companies like AT&T, Verizon, and Lumen Technologies. These breaches have raised significant concerns about the security of telecommunications infrastructure.