Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Smishing Triad Tied To Global Phishing

October 28, 2025
Reading Time: 3 mins read
in Alerts
Smishing Triad Tied To Global Phishing

A major smishing campaign, linked to a China-based group called the Smishing Triad, has utilized an immense infrastructure of over 194,000 malicious domains since the start of 2024 to target users globally. The group is notorious for flooding mobile devices with fraudulent text messages, often impersonating toll violation or package delivery notices to compel users to immediately click a link and provide personal data. While the domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the operational security apparatus is primarily hosted on popular U.S. cloud services. This tactic has proven extremely profitable for the Smishing Triad, with reports suggesting they have earned more than $1 billion over the last three years.

The Smishing Triad has recently broadened its focus, according to Fortra, with associated phishing kits increasingly used to target brokerage accounts to steal banking credentials and authentication codes. Attacks aimed at these financial accounts saw a dramatic fivefold increase in the second quarter of 2025 compared to the previous year. Once an account is compromised, the attackers manipulate stock market prices using “ramp and dump” schemes, a method that leaves almost no financial paper trail. The threat collective has evolved from simply selling phishing kits to becoming a “highly active community,” operating a comprehensive phishing-as-a-service (PhaaS) ecosystem that recruits various specialized actors, including kit developers, data brokers, domain sellers, and large-scale spammers.

The sheer scale of the operation is evident in the domain registration data, with nearly 93,200 of the root domains registered through Dominet (HK) Limited. A significant majority of the malicious domains use the “.com” prefix, although “gov” domain registrations have been increasing recently. The short lifespan of the phishing sites is a core element of the group’s evasion strategy: nearly 71.3% of the identified domains were active for less than a week, and less than 6% remained active beyond three months. This rapid domain churn ensures a continuous stream of new infrastructure to constantly bypass security defenses. Furthermore, the 194,345 fully qualified domain names (FQDNs) used in the campaign resolve to over 43,494 unique IP addresses, most of which are located in the U.S. and hosted on Cloudflare.

An analysis of the lures shows that the U.S. Postal Service (USPS) is the single most impersonated service, accounting for 28,045 FQDNs. The largest category of all impersonated services, however, is toll services, with approximately 90,000 dedicated phishing FQDNs. Though the bulk of the attack infrastructure generating the largest volume of traffic is located in the U.S., followed by China and Singapore, the campaigns have a truly global reach. They have mimicked a vast array of services in countries like Russia, Poland, and Lithuania, targeting banks, cryptocurrency exchanges, police forces, and carpooling applications.

In campaigns impersonating government services, victims are typically redirected to landing pages that demand payment for unpaid tolls or other charges. In some sophisticated instances, the attackers use ClickFix lures to trick users into running malicious code under the guise of completing a CAPTCHA security check. This smishing operation is not a set of isolated events but rather a massive, highly decentralized campaign with a global footprint, constantly impersonating services across numerous sectors and registering and rapidly discarding thousands of domains daily to remain elusive.

Reference:

  • Smishing Triad Connected To 194000 Malicious Domains In Major Phishing Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Toys R Us Canada Data Breach Alert

Fake LastPass Death Claims Breach Vaults

October 28, 2025
Toys R Us Canada Data Breach Alert

ChatGPT Atlas Browser Fooled By Fake Url

October 28, 2025
Toys R Us Canada Data Breach Alert

Chrome Zero Day Delivers LeetAgent

October 28, 2025
Qilin Ransomware Uses Hybrid Attack

Qilin Ransomware Uses Hybrid Attack

October 28, 2025
Qilin Ransomware Uses Hybrid Attack

Hackers Exploit Outdated WordPress Plugins

October 28, 2025
China Hackers Breach Telecom Firm

China Hackers Breach Telecom Firm

October 24, 2025

Latest Alerts

Fake LastPass Death Claims Breach Vaults

ChatGPT Atlas Browser Fooled By Fake Url

Chrome Zero Day Delivers LeetAgent

Smishing Triad Tied To Global Phishing

Qilin Ransomware Uses Hybrid Attack

Hackers Exploit Outdated WordPress Plugins

Subscribe to our newsletter

    Latest Incidents

    Google Contractor Steals Play Files

    Vibra Hospital Data Breach Probe

    Hackers Target Swedish Power Grid

    Ex-L3Harris Cyber Boss Charged With Espionage

    Safepay Hits Xortec Video Surveillance Firm

    Hackers Breach Verstappen Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial