Smishing Network Tied to 194,000 Malicious Domains in Global Phishing Scheme

Published:

spot_img

Oct 24, 2025Ravie LakshmananData Breach / Cybercrime

New Findings on Ongoing Smishing Campaigns

Recent investigations by Palo Alto Networks’ Unit 42 have unveiled a significant and persistent smishing campaign, which has been tied to over 194,000 malicious domains since January 1, 2024. This alarming rise in smishing activity is targeting a diverse array of services worldwide, raising concerns about the security of personal information across multiple platforms.

The Infrastructure Behind the Attack

Research indicates that despite the domains being registered through a registrar based in Hong Kong and utilizing Chinese nameservers, the attack’s infrastructure is largely hosted on popular cloud services in the United States. Security experts, including Reethika Ramesh, Zhanhao Chen, and others, have underscored this paradoxical nature of the operation, which represents a sophisticated threat landscape.

Identifying the Smishing Triad

This series of smishing attacks has been linked to a group referred to as the Smishing Triad. This collective is notorious for bombarding mobile users with deceptive messages regarding toll violations and package deliveries. The aim is to provoke immediate reactions, encouraging victims to divulge sensitive personal information. The success of these campaigns has been staggering, with estimates suggesting the group has amassed more than $1 billion in profits over the last three years, highlighting the dangerous profitability of such cyber crimes.

Techniques and Targeted Accounts

Adding to the urgency, a recent Fortra report has revealed that phishing kits connected to the Smishing Triad are increasingly targeting brokerage accounts. These attacks have surged fivefold in the second quarter of 2025 compared to the same time last year. Security researcher Alexis Ober pointed out that once attackers compromise an account, they may manipulate stock prices using “ramp and dump” strategies—tactics that leave little to trace, increasing the financial threats posed by these operations.

The Ecosystem of Phishing-as-a-Service

The Smishing Triad’s evolution is notable; they have transformed from mere providers of phishing kits to a robust community engaging various threat actors. This ecosystem encompasses developers of phishing kits, data brokers selling target phone numbers, domain registrars registering temporary domains, hosting providers supplying servers, spammers distributing phishing messages, and even tools for validating and rotating these domains. Each element plays a critical role in the phishing-as-a-service (PhaaS) model that thrives in this landscape.

Analysis of Domain Usage and Registration

Unit 42’s examination revealed that approximately 93,200 of the 136,933 root domains registered under Dominet (HK) Limited, a Hong Kong-based registrar. Interestingly, domains prefixed with “com” dominate the registrations, although there has been a notable uptick in “gov” domains recently.

The data also shows that 39,964 domains were active for only two days or less, with 71.3% being operational for less than a week. Furthermore, an alarming 82.6% had been active for two weeks or less. This rapid turnover indicates a strategic focus on quickly registered domains, enabling the campaign to evade detection effectively.

Services Most Frequently Impersonated

The analysis highlighted that the U.S. Postal Service (USPS) is the most frequently impersonated service, with a staggering 28,045 registered domains. Phishing efforts leveraging toll service scams top the impersonation categories, accounting for about 90,000 dedicated phishing domains. These campaigns have been observed mimicking a variety of services, including banks, delivery systems, and e-commerce platforms across several countries.

Exploiting Government Services

Phishing schemes impersonating government services often redirect victims to phishing pages demanding payment for fictitious toll violations or service fees. In some instances, these scams utilize ClickFix tactics to fool users into executing harmful code under the guise of completing a verification step.

Unit 42 emphasized that the smishing campaigns impersonating U.S. toll services are not isolated incidents; instead, they represent a large-scale, decentralized operation that impersonates numerous services across different sectors. Attackers are registering and cycling through thousands of new domains daily, showcasing the extensive reach and evolving nature of these threats.

spot_img

Related articles

Recent articles

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies

Fighting AI-Driven Cyberattacks with Preemptive Cyber Deception Strategies Recent developments in artificial intelligence (AI) have underscored its role in facilitating advanced cyber espionage campaigns, as...

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean

Afreximbank Launches Season II of ‘Impact Stories,’ Highlighting Transformative Projects Across Africa and the Caribbean The African Export-Import Bank (Afreximbank) has announced the launch of...

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions

Cohesity Advances Cyber Resilience with Enhanced Data Protection and AI Security Solutions Cohesity has unveiled significant enhancements to its data protection and security portfolio, aimed...

CISOs Must Strengthen Phishing Detection: 3 Essential Steps for Scaling SOC Effectiveness

CISOs Must Strengthen Phishing Detection: 3 Essential Steps for Scaling SOC Effectiveness Phishing has evolved into one of the most challenging threats for enterprises to...