DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Alerts

SMS Bomber Market Exploitation

August 18, 2023
Reading Time: 2 mins read
in Alerts

The evolving landscape of cybersecurity is witnessing a surge in threats, and among them, SMS Bomber attacks have emerged as a concerning modern menace. These attacks involve flooding victims’ phone numbers with a deluge of text messages, triggering disruptive effects such as vibrations, alert sounds, and notifications.

SOCRadar researchers have brought to light a disturbing revelation: hackers are actively selling SMS Bomber attack tools on underground forums, utilizing them for nefarious purposes including trolling, cyberbullying, and diversion tactics. Notably, these threats extend beyond underground forums to messaging and open-source platforms like Telegram, ICQ, Discord, GitHub, and Replit.

The pricing dynamics of this illicit market were exposed by security analysts at SOCRadar, showcasing a range of offerings. The rates include options such as flooding emails, phone calls, and SMS messages. The accessibility and affordability of these attack services are concerning, with prices as low as $0.03 per spam SMS.

Particularly striking is the example of a membership-based panel discovered via a redirected link, offering various SMS attack services with fees based on attack duration. Messaging platforms like Telegram have become a breeding ground for these threats, exemplified by a channel boasting nearly 95,000 subscribers. This channel, active since December 16, 2022, underscores the scale of this issue.

Security analysts have engaged with these tools to comprehend their capabilities, discovering that the bots behind them can perform SMS flooding, make flood calls, send callback requests, prank calls, and even send recordings of the call. The researchers encountered an SMS Validator app on Telegram, mirroring the functionality of an SMS Bomber and available for a fee of $18 for single and lifetime use.

These tools have extended their reach to open-source platforms like GitHub and Replit, with cybersecurity experts spotting various code queries associated with SMS bombing. The need for robust protection measures has never been more critical, encompassing spam filters, number hiding, reliable sources, API security, authentication layers, data breach monitoring, web security, authorization, and access controls.

Source:
  • SMS Bomber: How Dangerous Can a Text Be?
Tags: AlertsAlerts 2023AttackersAugust 2023CyberattackCybersecurityExploitingSMSSMS BomberVulnerabilities
26
VIEWS
ADVERTISEMENT

Related Posts

Critical WordPress Plugin Flaws

Critical WordPress Plugin Flaws

September 29, 2023
Cisco Warns of Critical SD-WAN Flaw

Cisco Warns of Critical SD-WAN Flaw

September 29, 2023
Malicious Packages on npm and PyPI

Malicious Packages on npm and PyPI

September 29, 2023
Critical WordPress Plugin Flaws

Critical SharePoint Vulnerabilities Revealed

September 29, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Cyber Briefing

September 22, 2023 – Cyber Briefing

September 22, 2023
Alerts

Chinese-Language Phishing Campaigns

September 20, 2023
Cyber Briefing

September 21, 2023 – Cyber Briefing

September 21, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.