Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

Cyberinchief by Cyberinchief
October 25, 2025
Reading Time: 4 mins read
0
Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation


RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

Oct 24, 2025Ravie LakshmananData Breach / Cybercrime

The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42.

“Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is primarily hosted on popular U.S. cloud services,” security researchers Reethika Ramesh, Zhanhao Chen, Daiping Liu, Chi-Wei Liu, Shehroze Farooqi, and Moe Ghasemisharif said.

The activity has been attributed to a China-linked group known as the Smishing Triad, which is known to flood mobile devices with fraudulent toll violation and package misdelivery notices to trick users into taking immediate action and providing sensitive information.

These campaigns have proven to be lucrative, allowing the threat actors to make more than $1 billion over the last three years, according to a recent report from The Wall Street Journal.

DFIR Retainer Services

In a report published earlier this week, Fortra said phishing kits associated with the Smishing Triad are being used to increasingly target brokerage accounts to obtain banking credentials and authentication codes, with attacks targeting these accounts witnessing a fivefold jump in the second quarter of 2025 compared to the same period last year.

Buy JNews
ADVERTISEMENT

“Once compromised, attackers manipulate stock market prices using ‘ramp and dump’ tactics,” security researcher Alexis Ober said. “These methods leave almost no paper trail, further heightening the financial risks that arise from this threat.”

The adversarial collective is said to have evolved from a dedicated phishing kit purveyor into a “highly active community” that brings together disparate threat actors, each of whom plays a crucial role in the phishing-as-a-service (PhaaS) ecosystem.

This includes phishing kit developers, data brokers (who sell target phone numbers), domain sellers (who register disposable domains for hosting the phishing sites), hosting providers (who provide servers), spammers (who deliver the messages to victims at scale), liveness scanners (who validate phone numbers), and blocklist scanners (who check the phishing domains against known blocklists for rotation).

The PhaaS ecosystem of the Smishing Triad

Unit 42’s analysis has revealed that nearly 93,200 of the 136,933 root domains (68.06%) are registered under Dominet (HK) Limited, a registrar based in Hong Kong. Domains with the prefix “com” account for a significant majority, although there has been an increase in the registration of “gov” domains in the past three months.

Of the identified domains, 39,964 (29.19%) were active for two days or less, 71.3% of them were active for less than a week, 82.6% of them were active for two weeks or less, and less than 6% had a lifespan beyond the first three months of their registration.

“This rapid churn clearly demonstrates that the campaign’s strategy relies on a continuous cycle of newly registered domains to evade detection,” the cybersecurity company noted, adding the 194,345 fully qualified domain names (FQDNs) used in the resolve to as many as 43,494 unique IP addresses, most of which are in the U.S. and hosted on Cloudflare (AS13335).

CIS Build Kits

Some of the other salient aspects of the infrastructure analysis are below –

  • The U.S. Postal Service (USPS) is the single most impersonated service with 28,045 FQDNs.
  • Campaigns using toll services lures are the most impersonated category, with about 90,000 dedicated phishing FQDNs.
  • The attack infrastructure for domains generating the largest volume of traffic is located in the U.S., followed by China and Singapore.
  • The campaigns have mimicked banks, cryptocurrency exchanges, mail and delivery services, police forces, state-owned enterprises, electronic tolls, carpooling applications, hospitality services, social media, and e-commerce platforms in Russia, Poland, and Lithuania.

In phishing campaigns impersonating government services, users are often redirected to landing pages that claim unpaid toll and other service charges, in some cases even leveraging ClickFix lures to trick them into running malicious code under the pretext of completing a CAPTCHA check.

“The smishing campaign impersonating U.S. toll services is not isolated,” Unit 42 said. “It is instead a large-scale campaign with global reach, impersonating many services across different sectors. The threat is highly decentralized. Attackers are registering and churning through thousands of domains daily.”



Source link

Tags: DomainsGloballinkedMaliciousoperationphishingSmishingTriad
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
Cyber Security Is Important! 🔐 | #Utopia

Cyber Security Is Important! 🔐 | #Utopia

Essay on Cyber Crime In english | 10 lines on cyber crime essay

Essay on Cyber Crime In english | 10 lines on cyber crime essay

Recommended Stories

When Europe Deprives Itself of Its Own Cybersecurity Strengths

When Europe Deprives Itself of Its Own Cybersecurity Strengths

October 5, 2025
M.VENKAT REDDY C.I Golden Hour  CYBER CRIME  AWARENESS VIDEO | PTC AMBERPET.#police #cybercrime

M.VENKAT REDDY C.I Golden Hour CYBER CRIME AWARENESS VIDEO | PTC AMBERPET.#police #cybercrime

November 11, 2025
The Complete Cybersecurity Roadmap 2025 | Advice for Beginners | Quality Thought

The Complete Cybersecurity Roadmap 2025 | Advice for Beginners | Quality Thought

November 5, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested