Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Phishing

Massive China-Linked Smishing Campaign Leveraged 194,000 Domains

The malicious Smishing Triad domains were used to collect sensitive information, including Social Security numbers.

AI Phishing

Threat actors are impersonating critical and general services, online platforms, and cryptocurrency exchanges in a massive smishing campaign that has been ongoing since April 2024, Palo Alto Networks warns.

The cybersecurity firm first warned of the campaign in early March, when it identified over 10,000 domains linked to the impersonation of toll and package delivery services. Roughly a month later, it warned of over 91,500 root domains employed in these attacks.

Subsequent analysis revealed that the campaign is much more extensive, with over 194,000 malicious domains used in these attacks since January 1, 2024.

In addition to toll and package delivery services, the attacks also impersonate healthcare organizations, banks, cryptocurrency platforms, ecommerce and online payment platforms, law enforcement, and social media platforms.

“The campaign is highly decentralized, lacking a single point of control, and uses a large number of domains and a diverse set of hosting infrastructure. This is advantageous for the attackers as churning through thousands of domains weekly makes detection more difficult,” Palo Alto Networks notes.

Most of the attacks focus on US users, but the campaign’s reach is, in fact, global, with victims identified in Argentina, Australia, Canada, France, Germany, Ireland, Israel, Lithuania, Malaysia, Mexico, Poland, Russia, UAE, the UK, and other countries.

Advertisement. Scroll to continue reading.

Responsible for the campaign, Palo Alto Networks says, is a Chinese-speaking threat actor known as the Smishing Triad, which has been active since at least 2023. In addition to SMS phishing, it was also seen sending emails to iPhone users’ iMessage app in attacks impersonating India Post.

Earlier this year, the threat actor was seen boasting on its Telegram channel about a new phishing kit dubbed Lighthouse that could target major Western financial organizations and banks in Australia and the APAC region.

Smishing Triad’s attacks, Palo Alto Networks notes, are constantly evolving, and the large number of domains associated with the campaign proves that.

The constant remains the personalized SMS messages that rely on social engineering to imply urgency and lure victims to the malicious domains where they are tricked into sharing their personal information, including their Social Security numbers and similar national identifiers.

The campaign is likely supported by a phishing-as-a-service (PhaaS) operation. The threat actors involved are likely specialized in different stages of the supply chain and include a data broker, domain seller, hosting provider, a phishing kit developer, an SMS spammer, and support roles checking for valid phone numbers and blocked domains.

Most of the domains (82.6%) used in the campaign had a life span of two weeks or less, and less than 6% were active three months after registration. According to Palo Alto Networks, 29.19% of the domains were active for two days or less.

Roughly 90,000 of the fraudulent domains impersonated toll services, and more than 28,000 impersonated the US Postal Service (USPS).

Other domains impersonated a consumer electronics company, a financial services firm, government services such as the IRS and US state vehicle departments, mail and delivery services, police forces, carpooling applications, hospitality services, personal cloud services, and online games and marketplaces for in-game skins.

“We advise people to exercise vigilance and caution. People should treat any unsolicited messages from unknown senders with suspicion. We recommend that people verify any request that demands urgent action using the official service provider’s website or application,” Palo Alto Networks notes.

Related: Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm

Related: SIM Farm Dismantled in Europe, Seven Arrested

Related: In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach

Related: Two Arrested in UK for Smishing Campaign Powered by Homemade SMS Blaster

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.