SMS Phishing (Smishing) in Hong Kong: Real Examples

Fake Octopus refund alerts, bank security warnings, and government fine notices via SMS are among the most prevalent scams targeting Hong Kong residents. Learn to recognise and resist them.

SMS phishing smishing attacks in Hong Kong illustration
1What Is Smishing

What Is SMS Phishing (Smishing) and Why Is It Effective in Hong Kong?

Smishing — SMS phishing — uses text messages to deceive recipients into clicking malicious links or calling fraudulent numbers. It is particularly effective in Hong Kong for several reasons: the city's high smartphone penetration means almost everyone receives and acts on SMS notifications; critical services like banking, Octopus, and government communications do use SMS legitimately, making fraudulent messages plausible; and SMS messages are more trusted than email by many users, who are less accustomed to scrutinising them as carefully as emails.

Smishing messages typically create urgency around financial, delivery, or official matters. Common themes in Hong Kong include: suspicious banking transaction requiring immediate confirmation; Octopus card balance refund or suspicious usage; package unable to be delivered requiring re-scheduling; government fine or tax underpayment requiring immediate settlement; reward points about to expire; and account suspension requiring identity verification. Each theme exploits a common Hong Kong service and creates a reason to click without thinking.

The technical mechanism is similar to email phishing: a link in the SMS leads to a fraudulent website that mimics a legitimate service and harvests credentials or payment information. Some smishing links install malware on the device when clicked, even without further user interaction — a technique prevalent in campaigns targeting Android devices where malicious APK files can be downloaded. iOS devices are somewhat more protected due to App Store restrictions, but phishing site credential harvesting affects both platforms equally.

  • High trust in SMS: Many HK users scrutinise SMS less critically than emails — attackers exploit this
  • Legitimate SMS use: Real banks, Octopus, and government do use SMS — making fraudulent messages plausible
  • Common HK themes: Banking alerts, Octopus refunds, package delivery, government fines, reward points expiry
  • Link-based attacks: Malicious links harvest credentials or deliver malware — both platforms affected
  • Android APK risk: Some smishing campaigns deliver malicious APK files — extra risk for Android users
  • Number spoofing: Sender numbers can be spoofed to appear as your bank's official sender ID
How smishing fits into the broader phishing landscape →
SMS phishing smishing mechanism in Hong Kong
2Real HK Examples

Common Smishing Message Patterns in Hong Kong

Understanding the specific message patterns used in HK smishing campaigns dramatically improves detection. Octopus card smishing typically claims a refund is available — "Your Octopus card HK$XXX refund is ready — verify your card at [fraudulent link]" — or that suspicious usage has been detected. The link leads to a site mimicking the Octopus website that asks for card number, HKID, and PIN — information the real Octopus service would never request via an SMS link.

Bank smishing messages impersonate HSBC, Hang Seng, Bank of China, Standard Chartered, and Citibank. Common scenarios include: unusual transaction requiring confirmation, account security lockout requiring identity verification, and credit limit increase requiring linked card details. These messages typically include a partial account number to appear credible — often just four digits that could apply to millions of accounts. The links lead to pixel-perfect bank website clones that capture full credentials.

Package delivery smishing impersonates SF Express, DHL, FedEx, and HK Post. Messages claim a package cannot be delivered due to an unpaid customs duty or an address error, directing recipients to a fake site requesting payment card details. Government smishing impersonates IRD (tax department), Immigration Department, and Hong Kong Police, using threatening language about overdue tax payments, warrants for arrest, or immigration violations requiring immediate attention.

  • Octopus smishing: Fake refund alerts or suspicious usage — asks for card number, HKID, PIN via link
  • Bank smishing: Fake transaction alerts, account lockouts — pixel-perfect bank site clones capture credentials
  • Delivery smishing: Fake customs duty or address error — SF Express, DHL, HK Post impersonation
  • Government smishing: IRD, Immigration, Police impersonation with threats of arrest or fines
  • Partial account numbers: Including "last 4 digits" makes messages seem credible — this data is widely available
  • Number spoofing: SMS sender numbers forged to appear as your actual bank's registered sender ID
Government impersonation scams in Hong Kong →
Common HK smishing message examples Octopus bank
3Detection Techniques

How to Identify Smishing Messages Before You Click

The most reliable detection technique for smishing is to examine the link URL before tapping it. Hold the link with a long-press on mobile to preview the actual URL without following it. Compare this URL to the official domain of the purported sender — the Octopus official site is octopuscards.com, not octopus-hk.com or octopuscard.com.verification-portal.net. Any URL that does not match the organisation's well-known official domain should be treated as suspicious.

Consider whether the communication channel makes sense. Banks and government departments do send SMS notifications, but they do not send SMS links asking you to enter credentials, payment card details, or HKID numbers. Octopus does not refund money through SMS links — refunds are handled through the Octopus app or at service points. If an SMS is asking you to do something you would not normally do through that channel, that mismatch is itself a red flag worth investigating before acting.

Cross-reference with your account activity. If a smishing message claims there is a suspicious transaction on your bank account, log in to your bank's official app directly (opened from your home screen, not through any SMS link) and check whether any such transaction actually exists. Most smishing messages reference generic scenarios that apply to millions of people — when you check your actual account, there is no corresponding transaction, confirming the message is fraudulent.

  • Preview links before tapping: Long-press to see actual URL — never tap unknown links in SMS without previewing
  • Check official domains: octopuscards.com, hsbc.com.hk, gov.hk — any variation is suspicious
  • Question the channel: Would this organisation actually ask for credentials via an SMS link?
  • Verify in official app: Open your bank's app from your home screen — not from any link in an SMS
  • Treat unsolicited links with suspicion: If you did not request an SMS with a link, it is probably smishing
  • Call on official number: Verify any smishing claim by calling the organisation on their published, verified phone number
How to spot phishing across all communication channels →
How to identify smishing messages in Hong Kong
4If You Clicked a Link

What to Do If You Clicked a Smishing Link or Entered Information

If you tapped a smishing link but did not enter any information on the landing page, close the browser immediately and run a security scan on your device. On Android, run Google Play Protect and check for any recently installed apps you do not recognise. On iPhone, the risk from simply visiting a phishing site without entering information is lower due to iOS sandboxing, but still close the browser and clear your browsing history. Change credentials for the service the message claimed to be from as a precaution.

If you entered credentials or payment information on a smishing site, act immediately. Call your bank on the number on the back of your card and report that you may have been phished — ask them to monitor for fraudulent transactions and consider temporarily locking your card and online banking access. Change the password for the affected service through the official app or website immediately. If you entered your HKID number, be alert for identity fraud attempts — this information can be used for fraudulent credit applications and other financial crimes.

Report the smishing message and link to help protect others. Forward the original SMS to your mobile carrier's spam reporting service. Report to HKCERT at hkcert.org/report. If it impersonated a bank, report to that bank's fraud team directly. If it impersonated a government agency, report to the relevant agency and to the HKPF Cyber Security and Technology Crime Bureau at 182 388. Quick reporting helps get smishing infrastructure taken down faster, protecting other potential victims in Hong Kong.

  • Link clicked only: Close browser, run security scan, check for unknown new apps, change affected credentials
  • Credentials entered: Call bank fraud line immediately, change password, monitor for unauthorised transactions
  • Payment info entered: Call card issuer immediately, request card freeze, monitor statements closely
  • HKID entered: Alert PCPD, monitor credit record via TransUnion, watch for identity fraud attempts
  • Report the SMS: Forward to carrier spam number, HKCERT, and impersonated organisation's fraud team
  • HKPF report: 182 388 — Cyber Security and Technology Crime Bureau for cybercrime reports
Complete guide to reporting phishing in Hong Kong →
What to do after clicking a smishing link in Hong Kong

Stay Alert to SMS Phishing in Hong Kong

Never tap SMS links for sensitive services — always navigate to the official app directly from your phone's home screen to verify any alert.

Related VPN Articles