Direct answer
What is smishing intelligence? It is phishing intelligence for SMS/mobile campaigns, including sender IDs, shortlinks, redirects, callbacks, lures and evidence.
Problem
Telecom and public-sector teams need to understand SMS phishing as campaigns, not isolated messages or URLs.
PhishNet unique data
PhishNet links Safeonweb/CCB context, BIPT reference data, SMS trap categories, shortlink expansion, callback number watch, QR/OCR extraction, liveness and brand-pressure analytics.
Public-safe proof module
Public modules can show sanitized lure families, shortlink/confirmation split and daily country pressure while operational message artifacts remain controlled.
Integration path
Exports include smishing URLs, sender-ID abuse, callback numbers, shortlink redirect chains, lure family and evidence references.
Conversion path
CTA: request SmishNet Belgium sample export or a telecom smishing briefing.
How PhishNet uses this
Inside PhishNet this topic is treated as operational graph context: observations are linked to sources, evidence, Belgian relevance, confirmation state, liveness, campaigns and exports. Public pages explain the method; authenticated users can pivot into the full platform workflow when a signal needs investigation or handoff.
Selected sources and research
These pages combine PhishNet platform knowledge with public research, official Belgian sources and open OSINT documentation.
Common questions
What is smishing intelligence?
It is phishing intelligence for SMS/mobile campaigns, including sender IDs, shortlinks, redirects, callbacks, lures and evidence.
Why is Belgium different?
Belgium is multilingual and heavily uses trusted public-service, banking, parcel and identity brands in mobile lures.