Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Text Message Based Phishing Attack from China Targeting Users Around the Globe

Posted on October 25, 2025October 25, 2025 By CWS

A classy textual content message phishing marketing campaign originating from China has emerged as one of the crucial intensive cybersecurity threats concentrating on customers worldwide.

The operation, attributed to a menace collective generally known as the Smishing Triad, represents a large escalation in SMS-based fraud, impersonating companies throughout banking, healthcare, legislation enforcement, e-commerce, and authorities sectors.

What started as remoted incidents of toll violation notices has developed right into a coordinated world marketing campaign affecting customers in over 121 international locations.

Palo Alto Networks analysts recognized the marketing campaign’s unprecedented scale by complete menace intelligence gathering.

Their analysis uncovered 194,345 totally certified domains spanning 136,933 root domains registered since January 2024.

The assault infrastructure demonstrates exceptional sophistication, with menace actors registering and biking by 1000’s of domains each day to evade detection mechanisms.

Nearly all of these domains stream by Dominet (HK) Restricted, a Hong Kong-based registrar, whereas using Chinese language nameservers for DNS infrastructure.

Nevertheless, the precise internet hosting infrastructure concentrates inside U.S. cloud companies, notably inside autonomous system AS13335 on the 104.21.0.0/16 subnet.

The marketing campaign’s supply mechanisms have undergone important transformation. Early assaults employed email-to-SMS options by iMessage, however menace actors have just lately transitioned to direct telephone number-based supply.

The PhaaS ecosystem of the Smishing Triad (Supply – Palo Alto Networks)

Messages predominantly originate from Philippine worldwide codes (+63) and U.S. numbers (+1), creating an phantasm of legitimacy.

The phishing messages themselves make use of subtle social engineering ways, incorporating focused private data and technical jargon to ascertain urgency and credibility.

Palo Alto Networks researchers famous that the operation capabilities as a complete Phishing-as-a-Service ecosystem working by Telegram channels.

Evaluation of the Smishing Triad’s communication networks revealed a extremely specialised provide chain with distinct roles.

Knowledge brokers promote goal telephone numbers, area sellers register disposable domains, and internet hosting suppliers preserve backend infrastructure.

Phishing equipment builders create frontend interfaces and credential harvesting dashboards, whereas SMS spammers ship messages at scale.

Supporting roles embody liveness scanners verifying energetic telephone numbers and blocklist scanners monitoring area popularity to set off fast asset rotation.

Underground Infrastructure and Area Lifecycle

The marketing campaign’s infrastructure displays exceptional resilience by decentralization and fast area biking.

Palo Alto Networks analysts noticed that 29.19 p.c of domains stay energetic for 2 days or much less, with 71.3 p.c lasting underneath one week.

Area naming conventions usually observe hyphenated string patterns like gov-addpayment.information or com-posewxts.high, intentionally crafted to deceive informal inspection.

The Telegram chat information exhibits varied underground service suppliers competing inside the PhaaS ecosystem.

Whereas the interconnected infrastructure reveals how 90 totally different root domains route by concentrated IP handle clusters inside Cloudflare’s community infrastructure.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Based, China, Globe, Message, Phishing, Targeting, Text, Users

Post navigation

Previous Post: Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks
Next Post: Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments

Related Posts

Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data Cyber Security News
Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak Cyber Security News
New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability Cyber Security News
How to Stay Ahead of Vulnerabilities Cyber Security News
New Quishing Attack With Weaponized QR Code Targeting Microsoft Users Cyber Security News
LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News