Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Researchers Track Massive Smishing Triad Network Targeting Global Victims
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Researchers Track Massive Smishing Triad Network Targeting Global Victims

Highlights

  • Smishing Triad uses thousands of domains for global phishing campaigns.

  • Attackers primarily impersonate postal, toll, and financial organizations.

  • Domains are rapidly recycled to evade detection and maximize impact.

Kaan Demirel
Last updated: 23 October, 2025 - 1:19 pm 1:19 pm
Kaan Demirel 8 hours ago
Share
SHARE

Cybersecurity specialists have exposed an extensive and highly organized phishing scheme, identified as Smishing Triad, that leverages text messages to deceive users worldwide. The operation, orchestrated primarily in Chinese, draws participation from thousands across the cybercrime ecosystem and has steadily expanded in scale and sophistication throughout 2024. As attackers adopt ever-changing techniques and infrastructure, innocent individuals and organizations from multiple countries are increasingly at risk of data compromise. Victims can be targeted regardless of geographic or industry boundaries, making vigilance indispensable for digital safety.

Contents
How Does Smishing Triad Operate?Which Sectors and Brands Are Impersonated?What Technologies and Tactics Are Used?

Previous reports of smishing, or SMS phishing, campaigns typically highlighted scattered, low-scale attacks, and known operations rarely revealed such diversity of infrastructure as now seen with Smishing Triad. Investigations before 2024 often detailed smaller scope, simpler organizational tactics, or fewer impersonated brands. The involvement of so many specialists—from spammers to infrastructure providers—marks a notable escalation, as does the dynamic use of U.S.-hosted servers and Hong Kong domain registrations. This contrasts with earlier identified Chinese-language phishing groups, which relied heavily on local resources with less international reach and diversity in their tactics.

How Does Smishing Triad Operate?

Unit 42, the research arm of Palo Alto Networks, traced around 195,000 domains linked to Smishing Triad since January. The operation is notable for its decentralization, engaging multiple actors who specialize in various aspects such as domain registration, infrastructure, phishing kit development, and bulk SMS delivery.

“They’re definitely harvesting the data for later use,”

stated Reethika Ramesh, a senior staff researcher at Palo Alto Networks, emphasizing the complex structure and goals of the network.

Which Sectors and Brands Are Impersonated?

Domains connected to the campaign frequently mimic legitimate services. These domains impersonate organizations from diverse fields, including the U.S. Postal Service, toll road agencies, financial institutions, healthcare, and social media companies. According to researchers, toll road services alone are represented in almost 90,000 fake domains, while the U.S. Postal Service is targeted in over 28,000 cases.

“We don’t necessarily know how many victims we can attribute to this technology or this group,”

remarked Ramesh, underlining the ongoing uncertainty about the full scale of victimization.

What Technologies and Tactics Are Used?

Most of the malicious activity utilizes infrastructure based in the United States, with a significant percentage of domains also hosted in China and Singapore. Domains are created with misleading elements, often featuring hyphenated strings followed by a top-level domain to appear legitimate. Attackers continuously rotate domain names and infrastructure, with the majority of domains remaining active for less than a week, hindering efforts to trace or disrupt the activities effectively.

Smishing Triad has evolved from a simple marketplace for phishing kits into a sophisticated network offering a wide range of criminal services. The group relies heavily on a Chinese language Telegram channel to coordinate and attract associates, transitioning into a hub that facilitates international operations. The ecosystem encompasses not only direct phishing participants but also those involved in data brokerage, infrastructure sales, and the ongoing verification of potential targets.

Analysis of public data and findings from multiple cybersecurity researchers indicate that SMS phishing continues to present significant risk due to its adaptability and ever-changing tactics. For those concerned about safeguarding sensitive personal or organizational information, using multi-factor authentication, scrutinizing sender authenticity, and reporting suspicious messages can mitigate potential damage from such operations. Realistically, the rapid turnover of malicious domains and decentralized nature of groups like Smishing Triad underscore the need for continued vigilance and international cooperation in threat intelligence to better address these kinds of campaigns in the future.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

New York Tightens Third-Party Rules for Financial Sector

Prosecutors Charge Ex-L3Harris Executive in Trade Secret Sales Case

Report Highlights Setbacks in US Cybersecurity Efforts Under Trump Administration

Senate Moves Forward on Tougher Robocall Safeguards Targeting Foreign Scams

China Accuses NSA of Prolonged Cyberattack on Time Service

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Tesla Outlines Next Steps for Hardware 3 Owners Seeking FSD Updates
Next Article Tesla Hits New Highs in Vehicle, AI, and Energy Milestones

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Digital Growth Drives Museums to Balance Art Experiences
Technology
Microsoft Demands Higher Xbox Profits and Cuts Studios
Gaming
Robotics Startups Highlight Innovations at RoboBusiness 2025
AI Robotics
Tesla Schedules Cybercab Launch and Ends Steering Wheel Debate
Electric Vehicle
Doctors Urge Shifting Focus from Managing to Reversing Chronic Disease
Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?