Mobile devices are increasingly vulnerable to SMS-based spearphishing attacks, which utilize Domain Generation Algorithms (DGAs) to rapidly change malicious infrastructure. A recent study compared various DGA detection methods, highlighting the need for more effective solutions tailored to mobile device smishing attacks1. The research revealed that existing detectors, primarily designed for email phishing and malware command and control (C2) datasets, often fall short in identifying DGA-driven domain tactics in mobile device attacks. This knowledge gap is significant, as eCrime actors continue to exploit mobile devices through smishing links. The study's findings emphasize the importance of developing detection methods that can effectively generalize to smishing-driven domain tactics outside of enterprise environments. So what matters to practitioners is that they must reassess their current DGA detection strategies to better protect mobile devices from these emerging threats.