Google's Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
Google on Thursday revealed that the scam defenses built into Android safeguard users around the world from more than 10 billion suspected malicious calls and messages every month. The tech giant also said it has blocked over 100 million suspicious numbers from using Rich Communication Services (RCS), an evolution of the SMS protocol, thereby preventing scams before they could even be sent. In
AI Analysis
Technical Summary
Google has implemented advanced AI-driven scam defenses within Android that block more than 10 billion suspected malicious calls and messages monthly worldwide. These defenses include on-device AI filtering that automatically moves spam and scam messages to a blocked folder in Google Messages and blocks over 100 million suspicious numbers from using Rich Communication Services (RCS). The scam messages primarily involve phishing tactics such as employment fraud, financial scams involving fake bills and investment schemes, romance scams, government impersonation, and technical support fraud. Attackers employ two main strategies: 'Spray and Pray,' which casts a wide net using urgent lures to induce quick clicks on malicious links often masked by URL shorteners, and 'Bait and Wait,' a patient, personalized approach that builds trust over time to maximize financial loss. Notably, scammers increasingly use group chats to lend legitimacy to their messages by including accomplices, making the scams appear as genuine conversations. The infrastructure behind these scams includes SIM farms for mass messaging, Phishing-as-a-Service kits for credential harvesting, and bulk messaging services for distribution. The scam activity follows distinct temporal patterns, peaking during U.S. workday mornings and Mondays, exploiting times when users are less vigilant. While Google's AI defenses significantly reduce exposure, the threat landscape remains volatile, with scammers shifting operations geographically in response to enforcement. The stolen personal data fueling these scams often originates from dark web marketplaces selling breach data. Overall, this threat represents a sophisticated, large-scale smishing campaign leveraging AI and infrastructure to target mobile users globally.
Potential Impact
For European organizations, this threat poses multiple risks including financial loss due to fraudulent transactions, theft of sensitive personal and corporate information, and reputational damage from compromised employee or customer data. The use of RCS and SMS as attack vectors means mobile users are directly targeted, potentially bypassing traditional email security controls. Employment fraud and investment scams can lead to significant monetary losses and legal liabilities. The personalized nature of some scams increases the likelihood of successful social engineering attacks against employees, which could facilitate further network intrusions or data breaches. Additionally, the high volume and evolving tactics strain security teams and user awareness efforts. The presence of SIM farms and bulk messaging services complicates attribution and mitigation, allowing attackers to rapidly shift tactics and targets. European financial institutions, HR departments, and customer service teams are particularly vulnerable due to the nature of the scams. The threat also impacts mobile network operators and messaging service providers, requiring coordinated defense efforts.
Mitigation Recommendations
European organizations should implement multi-layered defenses that include advanced mobile threat detection solutions capable of analyzing SMS and RCS traffic for phishing indicators beyond basic spam filtering. Employee training programs must emphasize awareness of smishing tactics, especially the risks of group chat scams and personalized social engineering. Organizations should collaborate with mobile network operators to identify and block suspicious numbers and SIM farm activities. Deploying URL filtering and sandboxing for links received via messaging apps can prevent malicious payload delivery. Encouraging the use of secure communication apps with end-to-end encryption and anti-phishing features can reduce exposure. Incident response plans should include procedures for handling smishing incidents and reporting to relevant authorities. Regular threat intelligence sharing within European cybersecurity communities can help track emerging scam campaigns and infrastructure shifts. Finally, organizations should advocate for stronger regulatory controls on bulk messaging services and SIM card sales to disrupt attacker infrastructure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
Google's Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
Description
Google on Thursday revealed that the scam defenses built into Android safeguard users around the world from more than 10 billion suspected malicious calls and messages every month. The tech giant also said it has blocked over 100 million suspicious numbers from using Rich Communication Services (RCS), an evolution of the SMS protocol, thereby preventing scams before they could even be sent. In
AI-Powered Analysis
Technical Analysis
Google has implemented advanced AI-driven scam defenses within Android that block more than 10 billion suspected malicious calls and messages monthly worldwide. These defenses include on-device AI filtering that automatically moves spam and scam messages to a blocked folder in Google Messages and blocks over 100 million suspicious numbers from using Rich Communication Services (RCS). The scam messages primarily involve phishing tactics such as employment fraud, financial scams involving fake bills and investment schemes, romance scams, government impersonation, and technical support fraud. Attackers employ two main strategies: 'Spray and Pray,' which casts a wide net using urgent lures to induce quick clicks on malicious links often masked by URL shorteners, and 'Bait and Wait,' a patient, personalized approach that builds trust over time to maximize financial loss. Notably, scammers increasingly use group chats to lend legitimacy to their messages by including accomplices, making the scams appear as genuine conversations. The infrastructure behind these scams includes SIM farms for mass messaging, Phishing-as-a-Service kits for credential harvesting, and bulk messaging services for distribution. The scam activity follows distinct temporal patterns, peaking during U.S. workday mornings and Mondays, exploiting times when users are less vigilant. While Google's AI defenses significantly reduce exposure, the threat landscape remains volatile, with scammers shifting operations geographically in response to enforcement. The stolen personal data fueling these scams often originates from dark web marketplaces selling breach data. Overall, this threat represents a sophisticated, large-scale smishing campaign leveraging AI and infrastructure to target mobile users globally.
Potential Impact
For European organizations, this threat poses multiple risks including financial loss due to fraudulent transactions, theft of sensitive personal and corporate information, and reputational damage from compromised employee or customer data. The use of RCS and SMS as attack vectors means mobile users are directly targeted, potentially bypassing traditional email security controls. Employment fraud and investment scams can lead to significant monetary losses and legal liabilities. The personalized nature of some scams increases the likelihood of successful social engineering attacks against employees, which could facilitate further network intrusions or data breaches. Additionally, the high volume and evolving tactics strain security teams and user awareness efforts. The presence of SIM farms and bulk messaging services complicates attribution and mitigation, allowing attackers to rapidly shift tactics and targets. European financial institutions, HR departments, and customer service teams are particularly vulnerable due to the nature of the scams. The threat also impacts mobile network operators and messaging service providers, requiring coordinated defense efforts.
Mitigation Recommendations
European organizations should implement multi-layered defenses that include advanced mobile threat detection solutions capable of analyzing SMS and RCS traffic for phishing indicators beyond basic spam filtering. Employee training programs must emphasize awareness of smishing tactics, especially the risks of group chat scams and personalized social engineering. Organizations should collaborate with mobile network operators to identify and block suspicious numbers and SIM farm activities. Deploying URL filtering and sandboxing for links received via messaging apps can prevent malicious payload delivery. Encouraging the use of secure communication apps with end-to-end encryption and anti-phishing features can reduce exposure. Incident response plans should include procedures for handling smishing incidents and reporting to relevant authorities. Regular threat intelligence sharing within European cybersecurity communities can help track emerging scam campaigns and infrastructure shifts. Finally, organizations should advocate for stronger regulatory controls on bulk messaging services and SIM card sales to disrupt attacker infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/googles-built-in-ai-defenses-on-android.html","fetched":true,"fetchedAt":"2025-11-01T01:10:55.756Z","wordCount":1368}
Threat ID: 69055e2471a6fc4aff34f147
Added to database: 11/1/2025, 1:11:00 AM
Last enriched: 11/1/2025, 1:12:34 AM
Last updated: 11/1/2025, 4:02:16 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
EDR-Redir V2: Blind EDR With Fake "Program Files"
MediumUNC6384 Targets European Diplomatic Entities With Windows Exploit
MediumIn Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution
MediumInvestigation Report: Android/BankBot-YNRK Mobile Banking Trojan
MediumGHOSTGRAB ANDROID MALWARE
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.