Asia Australia and Oceania Crime Europe World

Google Urges Smartphone Users to Disable 2G Amid Rising SMS Scam Threats

Google Urges Smartphone Users to Disable 2G Amid Rising SMS Scam Threats
Getty Images
  • PublishedJune 28, 2025

A growing threat from malicious text messages is prompting Google and cybersecurity experts to issue new guidance for smartphone users: disable 2G network connectivity if possible.

The warning follows increased reports of a dangerous technique known as “SMS blaster fraud,” where criminals bypass traditional mobile networks to directly deliver scam texts to phones.

The attacks use portable radio devices — known as SMS blasters — to trick smartphones into connecting to fake 2G cell towers, making it appear that the messages come from legitimate networks. Unlike traditional text scams that require a list of phone numbers, these devices target areas geographically, broadcasting fraudulent messages to any phone nearby with 2G enabled.

The texts often impersonate trusted institutions such as banks or government agencies, directing victims to click on links and disclose sensitive information.

Google has identified incidents of SMS blaster activity in multiple countries and warns that the method bypasses all carrier-based security filters, exposing users to increased risk of smishing (SMS phishing) attacks. In response, Google recommends that Android users disable 2G in their settings, a step that removes one of the main vulnerabilities exploited by these scams.

The latest version of Android (Android 16) includes Advanced Protection Mode, which disables 2G by default. On some devices, especially Google Pixel and Samsung models, the 2G toggle is available in cellular or network settings.

However, Apple iPhones currently do not offer the option to disable 2G unless users activate Lockdown Mode, a more aggressive security feature intended for high-risk users. In the meantime, iPhone users are advised to filter unknown senders and remain cautious of unsolicited messages.

In a recent case in London, a man was sentenced for using an SMS blaster hidden in his car to send thousands of fraudulent texts posing as government messages. The scam messages requested personal information under the guise of processing tax refunds. Authorities found the equipment in his vehicle after receiving one of the fake texts on a police officer’s phone.

Law enforcement officials in the UK, New Zealand, Thailand, and other countries have recorded similar incidents, highlighting the global spread of the threat.

Detective Chief Inspector Paul Curtis from the UK’s Dedicated Card and Payment Crime Unit (DCPCU) said:

“Criminals will make every attempt to bypass fraud prevention measures designed to protect consumers. It’s crucial that people stay alert, especially when receiving unexpected text messages.”

The 2G network, originally launched in the 1990s, lacks modern encryption and security protections. Though largely outdated, many phones still support 2G as a fallback option. As a result, scammers exploit this weakness to create fake network environments, pushing deceptive messages to unsuspecting users.

Even in regions where 2G has been phased out by network providers, devices with 2G enabled can still connect to fake towers — making it a device-level vulnerability, not a network one.

To protect against SMS-based fraud, Google and cybersecurity experts recommend the following:

  • Disable 2G connectivity on Android devices, where possible.

  • Do not click on links in unsolicited or suspicious messages.

  • Filter messages from unknown senders.

  • Report scam messages by forwarding them to 7726 in both the U.S. and UK.

  • Use built-in scam detection features, like those available on newer Google Pixel devices, which analyze call and message behavior using on-device AI without sharing data externally.

Although SMS blasters represent a newer and more localized threat, the broader concern remains: scams are growing more technically sophisticated and socially convincing. Trend Micro, a cybersecurity firm, reports that the impersonation of major brands like PayPal and Netflix remains the most common tactic, whether via network-based smishing or more advanced tools like SMS blasters.

Ultimately, experts stress that awareness and cautious behavior are critical.

“If a message sounds too good to be true or asks for personal information unexpectedly, it probably isn’t legitimate,” notes Trend Micro.

With input from Forbes and the Guardian.

Joe Yans

Joe Yans is a 25-year-old journalist and interviewer based in Cheyenne, Wyoming. As a local news correspondent and an opinion section interviewer for Wyoming Star, Joe has covered a wide range of critical topics, including the Israel-Palestine war, the Russia-Ukraine conflict, the 2024 U.S. presidential election, and the 2025 LA wildfires. Beyond reporting, Joe has conducted in-depth interviews with prominent scholars from top US and international universities, bringing expert perspectives to complex global and domestic issues.