Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI wants to harden browsers, but it could be a security nightmare

Smishing Triad links to 194,000 malicious domains in global phishing operation

Critical, newly patched Microsoft WSUS flaw exploited

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Smishing Triad links to 194,000 malicious domains in global phishing operation
Identity

Smishing Triad links to 194,000 malicious domains in global phishing operation

userBy userOctober 24, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 24, 2025Ravi LakshmananData breach/cyber crime

The attackers behind a large-scale, ongoing smishing campaign are believed to have engaged in more than 194,000 malicious domains targeting a wide range of services around the world since January 1, 2024, according to new research from Palo Alto Networks Unit 42.

Security researchers Reethika Ramesh, Zhanhao Chen, Daiping Liu, Chi-Wei Liu, Shehroze Farooqi, and Moe Ghasemisharif said, “Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is primarily hosted on popular cloud services in the United States.”

The activity was attributed to a China-linked group known as the Smishing Triad, which is known for bombarding mobile devices with fraudulent toll violation and misdelivery notifications to trick users into taking immediate action or providing sensitive information.

According to a recent report in the Wall Street Journal, these campaigns have proven lucrative, allowing attackers to earn more than $1 billion over the past three years.

DFIR retainer service

In a report published earlier this week, Fortra said phishing kits associated with the Smishing Triad are increasingly being used to target brokerage accounts to obtain banking credentials and authentication codes, and attacks targeting these accounts have jumped five times in the second quarter of 2025 compared to the same period last year.

“Once compromised, attackers use ‘ramp and dump’ tactics to manipulate stock prices,” security researcher Alexis Ober said. “These methods leave little paper trail, further increasing the economic risk posed by this threat.”

The adversary group is said to have evolved from a specialized purveyor of phishing kits into a “very active community” of disparate attackers, each playing a key role in the phishing-as-a-service (PhaaS) ecosystem.

These include phishing kit developers, data brokers (selling target phone numbers), domain sellers (registering disposable domains to host phishing sites), hosting providers (providing servers), spammers (delivering messages to victims at scale), liveness scanners (verifying phone numbers), and blocklist scanners (matching phishing domains against known blocklists for rotation).

Smishing Triad’s PhaaS Ecosystem

Unit 42’s analysis revealed that nearly 93,200 (68.06%) of the 136,933 root domains were registered with Dominet (HK) Limited, a Hong Kong-based registrar. Domains with the prefix “com” make up the majority, but the past three months have seen an increase in “gov” domain registrations.

Of the identified domains, 39,964 (29.19%) were active for less than 2 days, of which 71.3% were active for less than 1 week, 82.6% were active for less than 2 weeks, and less than 6% of domains survived beyond the first 3 months of registration.

“This rapid churn clearly demonstrates that the campaign’s strategy relies on a continuous cycle of newly registered domains to evade detection,” the cybersecurity firm notes, adding the 194,345 fully qualified domain names (FQDNs) used in the resolution to 43,494 unique IP addresses, most of which are located in the United States and hosted on Cloudflare (AS13335).

CIS build kit

Some of the other important aspects of infrastructure analysis are listed below.

The United States Postal Service (USPS) is the most impersonated single service with 28,045 FQDNs. Campaigns using paid service lures are the most spoofed category, with approximately 90,000 phishing-specific FQDNs. The attack infrastructure for the domains that generate the most traffic is located in the United States, followed by China and Singapore. The campaign imitates banks, virtual currency exchanges, postal and delivery services, police forces, state-owned enterprises, electronic toll booths, rideshare applications, hospitality services, social media, and e-commerce platforms in Russia, Poland, and Lithuania.

Phishing campaigns masquerading as government services often redirect users to landing pages that charge unpaid tolls or other service fees, and in some cases use the lure of ClickFix to run malicious code under the pretext of completing a CAPTCHA check.

“Smishing campaigns masquerading as paid services in the United States are not isolated,” Unit 42 said. “Instead, this is a massive campaign spread across the globe, impersonating many services across a variety of sectors. The threat is highly distributed. Attackers register thousands of domains and move back and forth every day.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCritical, newly patched Microsoft WSUS flaw exploited
Next Article OpenAI wants to harden browsers, but it could be a security nightmare
user
  • Website

Related Posts

Critical, newly patched Microsoft WSUS flaw exploited

October 24, 2025

APT36 targets Indian government with Golang-based DeskRAT malware campaign

October 24, 2025

Why do managers and practitioners view risk differently?

October 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI wants to harden browsers, but it could be a security nightmare

Smishing Triad links to 194,000 malicious domains in global phishing operation

Critical, newly patched Microsoft WSUS flaw exploited

Automattic files counterclaim against WP Engine in WordPress lawsuit alleging trademark misuse

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.