Home/Apps & Tools/Google Messages Adds SMS Blaster Protection
Messaging AppsApps & Tools

Google Messages Adds SMS Blaster Protection

Google Messages is introducing SMS blaster protection to block fake cell towers. Learn how to disable 2G and stop phishing scams on your Android.

Mar 10, 2026Apps & Tools

Mokbee field notes from Apps & Tools

Quick Facts

  • Feature Discovery: Recent APK teardown of Google Messages v20260306 reveals a dedicated toggle specifically for network security.
  • The Threat: Sophisticated SMS blasters, or IMSI catchers, can broadcast up to 100,000 fraudulent texts per hour to every phone in a 2km radius.
  • System Requirements: While Android 12 introduced the manual 2G toggle, upcoming Android 16 updates will include active fake cell tower detection alerts.
  • Blocking Power: Google's AI-driven infrastructure currently shields users from 2 billion suspicious messages every single month.
  • Network Defense: Automated safety checks for the RCS service successfully blocked more than 100 million suspicious numbers from sending potential scams in a single month.
  • Platform Comparison: According to a Google and YouGov study, Android users were 58% more likely than iOS users to avoid receiving scam text messages over a seven-day period.
  • Direct Solution: Users can currently mitigate risks by navigating to SIM settings and switching off the Allow 2G toggle.

SMS blaster protection is a critical security feature in Google Messages designed to block localized phishing scams sent via fake cell towers. By preventing network downgrade attacks, users can stay safe from sophisticated smishing attempts that often bypass traditional carrier-level spam filters.

What are SMS Blasters? Understanding the Local Phishing Threat

As an editor who spends most of my day testing the latest mobile hardware, I have seen security threats evolve from clumsy email scams to highly localized, hardware-based attacks. The newest threat on the block is the SMS blaster. These devices, technically known as IMSI catchers or cell-site simulators, are essentially "fake cell towers" that can fit into a backpack or the trunk of a car.

Unlike traditional spam that originates from a remote server and travels through your carrier's core network, these devices operate locally. They transmit a high-power cellular signal that tricks your phone into thinking it is connecting to a legitimate base station from Verizon, AT&T, or T-Mobile. Once your phone latches onto this fraudulent signal, the attacker can send unmonitored phishing messages directly to your device.

These attacks are not just theoretical. In recent months, law enforcement agencies in the UK and Thailand have arrested operators who were driving through crowded city centers, blasting thousands of malicious links to unsuspecting commuters. Because these messages never pass through the carrier's network, standard cloud-based filters often never see them, making Android text scam protection more important than ever.

The 2G Loophole: How Network Downgrade Attacks Work

You might wonder why a modern 5G smartphone would ever trust a suspicious signal from a backpack. The answer lies in a legacy cellular protocol: 2G (GSM). While we enjoy the speed of 5G and LTE, our phones maintain compatibility with 2G for emergency situations or areas with poor coverage.

The fundamental security flaw is that 2G lacks mutual authentication. In a 4G or 5G handshake, the phone and the tower both prove their identity to each other. In 2G, the phone simply trusts any tower that claims to be part of the network. Threat actors use signal hijacking techniques to broadcast a 2G signal that is much stronger than the legitimate 5G signal in the area.

Your phone, programmed to seek the strongest available connection, undergoes a network downgrade attack. It drops the secure 5G connection and connects to the attacker's fake station. Once the phone is downgraded to this insecure state, the attacker can execute man-in-the-middle threats, intercepting data or, more commonly, injecting fraudulent SMS messages that look like they come from your bank or a delivery service.

Technical Alert: Even if you have a 5G plan and a flagship phone, your device will default to 2G if it is the only signal available. Attackers exploit this "fail-safe" by using jammer-like technology to drown out higher-frequency bands, forcing every phone in the vicinity into the 2G trap.

New Feature: Enabling Google Messages Anti-Phishing Toggle

Google is taking a proactive stance with a new tool discovered in the beta code of the Google Messages app. An APK teardown analysis of version v20260306 shows that Google is preparing a dedicated Google Messages anti-phishing toggle. This feature is designed to work in tandem with system-level settings to provide real-time threat detection.

The upcoming SMS blaster protection feature within the app is expected to use on-device machine learning to analyze the characteristics of incoming messages. If a message is delivered via a suspicious, non-authenticated connection that bypasses the standard RCS or carrier routing, the app will flag it immediately.

There is a significant difference between the standard Google Messages anti-phishing toggle vs spam filter. While the spam filter looks at the content of the message (keywords, links, and sender history), the SMS blaster protection looks at the "how" and "where" of the delivery. It identifies cellular base station spoofing by noticing when a phone is suddenly forced into an unencrypted 2G state despite being in a high-coverage 5G area. This multi-layered approach is why Google reports that their systems are now capable of blocking billions of malicious attempts each month.

Person using a smartphone with a digital lock icon hovering above the screen to signify enhanced privacy settings.
New security updates in Google Messages aim to provide a digital shield against sophisticated SMS blaster and network downgrade attacks.

Step-by-Step Guide: How to Disable 2G on Android & Samsung

While we wait for the automated Google Messages toggle to roll out to all users, you can take immediate action by manually disabling 2G at the OS level. This is the most effective way to prevent your phone from ever connecting to an IMSI catcher.

Most modern Android devices running Android 12 or newer allow you to turn off 2G connectivity entirely. This does not affect your 4G or 5G service, though it may slightly impact coverage in extremely remote areas where 2G is the only signal left.

How to disable 2G on Google Pixel and standard Android devices:

  1. Open the Settings app on your smartphone.
  2. Select Network & Internet.
  3. Tap on SIMs (or Mobile network).
  4. Scroll down until you find the Allow 2G toggle.
  5. Switch the toggle to the Off position.

How to disable 2G on Samsung Galaxy devices:

Samsung uses a slightly different menu structure for its One UI interface. If you are using a Galaxy S23, S24, or a recent A-series device, follow this Samsung Galaxy allow 2G service toggle location:

  1. Open Settings and tap on Connections.
  2. Select Mobile Networks.
  3. Look for the Allow 2G service option.
  4. Toggle the switch to Off.

By following this disable 2G Android guide, you effectively close the door on the primary method used by SMS blasters to reach your inbox. For those looking ahead, Android 16 fake cell tower detection alerts will soon provide an even more granular level of security, notifying you the moment a suspicious station is detected in your vicinity.

Comparing Security: Android 2G Toggle vs. iPhone Lockdown Mode

Apple and Google handle the threat of fake cell towers differently. While Android provides a specific, surgical strike against 2G, iPhone users must opt for a more comprehensive (and restrictive) security setting.

Feature Android (Pixel/Samsung) iPhone (iOS)
Primary Method Allow 2G Toggle Lockdown Mode
Ease of Use High (Single toggle) Low (Restricts many apps)
Effectiveness Blocks 2G-based blasters Blocks 2G-based blasters
Impact on Usage Minimal (Impacts legacy roaming) Significant (Blocks attachments, web features)
Alert System Coming in Android 16 Internal system protections

If you are an iPhone user, you cannot simply "turn off 2G" via a single menu. To get the same level of protection against an SMS blaster, you must enable Lockdown Mode under Privacy & Security settings. However, be warned: Lockdown Mode is designed for high-risk individuals like journalists or activists and will disable several features in Safari, Messages, and Photos.

FAQ

What is an SMS blaster and how does it work?

An SMS blaster is a portable radio device that acts as a fake cell tower. It exploits a vulnerability in the 2G cellular protocol to force nearby phones to connect to it. Once connected, the device can send text messages directly to the phone, bypassing the security filters of legitimate mobile carriers.

How can I protect my phone from SMS blaster attacks?

The most effective way to protect yourself is to disable 2G connectivity in your phone's settings. By turning off the Allow 2G toggle, your phone will refuse to connect to the insecure signals used by these devices. Additionally, keeping Google Messages updated will ensure you receive the latest anti-phishing features and AI-powered detection.

How do SMS blasters bypass standard spam filters?

Standard spam filters usually live on a carrier's servers or in the cloud. Because an SMS blaster connects directly to your phone via local radio waves, the message never actually travels through the carrier's network infrastructure. This "local injection" means the carrier never has the chance to scan or block the message before it reaches your screen.

How can I tell if my mobile number is being targeted by an SMS blaster?

It is often difficult to tell because the messages appear in your normal SMS inbox. However, signs of an attack include your phone suddenly dropping from 5G to 2G or "Emergency Calls Only" mode, followed by receiving a suspicious text with a link. Some users also report a sudden, temporary loss of data connectivity just before a scam message arrives.

Do mobile carriers block SMS blaster messages automatically?

No, carriers generally cannot block these messages because they do not transit through the carrier's core network. The protection must happen on the device itself. This is why Google is building SMS blaster protection directly into the Android OS and the Messages app to detect and alert users of these localized radio threats.

Conclusion & Action Steps

The rise of localized smishing attacks is a reminder that mobile security is a moving target. While Google's infrastructure is incredibly effective—blocking 2 billion suspicious messages monthly—the "last mile" of security depends on the user.

To secure your mobile lifestyle, I recommend a three-part defense strategy. First, go into your settings today and follow the disable 2G Android guide to shut down the most common entry point for fake towers. Second, ensure you are using Google Messages as your default texting app to benefit from the upcoming Google Messages anti-phishing toggle. Finally, stay informed about the new Android 16 fake cell tower detection alerts which will add a necessary layer of transparency to our cellular connections.

In an era where your phone is your wallet, your identity, and your primary connection to the world, taking five minutes to adjust your cellular connectivity settings is the smartest upgrade you can make this year.

Related reads

More from Apps & Tools

A tighter edit of stories from the same category, arranged in the same reading rhythm used across the site.

01 / 06