Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links

Posted on October 1, 2025October 1, 2025 By CWS

Hackers have lately leveraged a vulnerability within the web-based administration interfaces of sure mobile routers to co-opt their built-in SMS performance for nefarious functions.

By focusing on uncovered APIs, attackers are in a position to dispatch massive volumes of malicious SMS messages containing weaponized hyperlinks that result in drive-by downloads or credential-stealing pages.

This rising menace vector exploits in any other case authentic community gear, remodeling routers into unwitting proxies for mass phishing campaigns and malware distribution.

Victims obtain SMS texts purporting to be safety alerts or supply notifications, however clicking the embedded URL triggers silent exploitation of gadget vulnerabilities or launches social-engineering traps.

All through August and September 2025, a number of safety operations facilities famous uncommon spikes in SMS visitors originating from residential and enterprise routers somewhat than mobile networks.

Sekoia researchers recognized that menace actors have been systematically scanning for endpoints exposing vendor APIs—significantly on fashions utilizing TR-064 or customized HTTP-based SMS interfaces.

As soon as found, these interfaces allow unauthenticated or weakly authenticated instructions to ship arbitrary SMS messages by way of the SIM card put in within the router.

Though the impacted routers differ by producer, commonalities embody default credentials left unchanged and outdated firmware missing API rate-limiting or enter validation.

The fast proliferation of this method highlights a essential blind spot: community directors not often monitor SMS logs on routers as rigorously as they do community visitors or firewall occasions.

In consequence, large-scale campaigns have gone unnoticed for weeks, permitting attackers to refine their messaging templates and evade detection.

Preliminary lure messages masquerade as two-factor authentication requests or pressing account restoration notifications, exploiting consumer belief in SMS channels. Subsequent campaigns pivot to extra focused bait based mostly on harvested knowledge, growing click-through charges and downstream compromise.

Past the instant threat of credential theft, profitable exploitation can ship secondary payloads that pivot into native networks.

As soon as a sufferer clicks the weaponized hyperlink, a drive-by exploit chain could deploy a backdoor to the consumer’s gadget, granting attackers persistent entry.

CSAM Phishing web page (Supply – Sekoia)

In company environments, this intrusion can facilitate lateral motion, knowledge exfiltration, or enrollment of extra units into the SMS-spam community—amplifying each reconnaissance and monetization alternatives for the menace actors behind these operations.

An infection Mechanism

On the core of this marketing campaign lies the abuse of the router’s SMS API endpoint. Attackers first brute-force or enumerate default administrative credentials to achieve shell-level or web-server entry.

With legitimate entry, they situation HTTP requests that mimic authentic SMS-sending instructions. The only type of this interplay will be illustrated with a curl snippet:-

curl – X POST
– H “Content material-Sort: software/json”
– d ‘{
“username”:”admin”,
“password”:”admin123″,
“vacation spot”:”+15551234567″,
“message”:”Your account requires instant verification:
}’

In lots of affected units, the API fails to implement sturdy enter sanitization, permitting attackers to inject HTML or JavaScript into the message payload.

This permits extra refined assaults, equivalent to weaponized hyperlinks that routinely execute on click on with out browser warnings.

Moreover, the SMS API usually exposes standing codes and supply experiences, offering suggestions that attackers use to measure marketing campaign success and optimize focusing on.

To automate these operations at scale, menace actors have repurposed compromised routers into distributed SMS-spam bots.

Customized scripts cycle by recipient lists, randomize sender IDs, and rotate message templates. Some variants even combine with public paste websites to dynamically replace malicious URLs, evading static detection by URL-filtering options.

By understanding this an infection mechanism, defenders can harden their environments: implement sturdy administrative credentials, disable unused SMS interfaces, and apply firmware updates that incorporate correct authentication and rate-limiting controls.

These measures, mixed with proactive SMS-traffic monitoring, can disrupt the fast development of this stealthy and impactful menace.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:API, Cellular, Exploit, Hackers, Links, Malicious, Messages, Routers, Send, SMS, Weaponized

Post navigation

Previous Post: Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device
Next Post: New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

Related Posts

Citrix NetScaler ADC and Gateway Vulnerability Enables Cross-Site Scripting Attacks Cyber Security News
Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware Cyber Security News
Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Cyber Security News
Cybersecurity News Recap – Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack Cyber Security News
SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month Cyber Security News
CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark