Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links

Posted on October 1, 2025October 1, 2025 By CWS

Hackers have lately leveraged a vulnerability within the web-based administration interfaces of sure mobile routers to co-opt their built-in SMS performance for nefarious functions.

By focusing on uncovered APIs, attackers are in a position to dispatch massive volumes of malicious SMS messages containing weaponized hyperlinks that result in drive-by downloads or credential-stealing pages.

This rising menace vector exploits in any other case authentic community gear, remodeling routers into unwitting proxies for mass phishing campaigns and malware distribution.

Victims obtain SMS texts purporting to be safety alerts or supply notifications, however clicking the embedded URL triggers silent exploitation of gadget vulnerabilities or launches social-engineering traps.

All through August and September 2025, a number of safety operations facilities famous uncommon spikes in SMS visitors originating from residential and enterprise routers somewhat than mobile networks.

Sekoia researchers recognized that menace actors have been systematically scanning for endpoints exposing vendor APIs—significantly on fashions utilizing TR-064 or customized HTTP-based SMS interfaces.

As soon as found, these interfaces allow unauthenticated or weakly authenticated instructions to ship arbitrary SMS messages by way of the SIM card put in within the router.

Though the impacted routers differ by producer, commonalities embody default credentials left unchanged and outdated firmware missing API rate-limiting or enter validation.

The fast proliferation of this method highlights a essential blind spot: community directors not often monitor SMS logs on routers as rigorously as they do community visitors or firewall occasions.

In consequence, large-scale campaigns have gone unnoticed for weeks, permitting attackers to refine their messaging templates and evade detection.

Preliminary lure messages masquerade as two-factor authentication requests or pressing account restoration notifications, exploiting consumer belief in SMS channels. Subsequent campaigns pivot to extra focused bait based mostly on harvested knowledge, growing click-through charges and downstream compromise.

Past the instant threat of credential theft, profitable exploitation can ship secondary payloads that pivot into native networks.

As soon as a sufferer clicks the weaponized hyperlink, a drive-by exploit chain could deploy a backdoor to the consumer’s gadget, granting attackers persistent entry.

CSAM Phishing web page (Supply – Sekoia)

In company environments, this intrusion can facilitate lateral motion, knowledge exfiltration, or enrollment of extra units into the SMS-spam community—amplifying each reconnaissance and monetization alternatives for the menace actors behind these operations.

An infection Mechanism

On the core of this marketing campaign lies the abuse of the router’s SMS API endpoint. Attackers first brute-force or enumerate default administrative credentials to achieve shell-level or web-server entry.

With legitimate entry, they situation HTTP requests that mimic authentic SMS-sending instructions. The only type of this interplay will be illustrated with a curl snippet:-

curl – X POST
– H “Content material-Sort: software/json”
– d ‘{
“username”:”admin”,
“password”:”admin123″,
“vacation spot”:”+15551234567″,
“message”:”Your account requires instant verification:
}’

In lots of affected units, the API fails to implement sturdy enter sanitization, permitting attackers to inject HTML or JavaScript into the message payload.

This permits extra refined assaults, equivalent to weaponized hyperlinks that routinely execute on click on with out browser warnings.

Moreover, the SMS API usually exposes standing codes and supply experiences, offering suggestions that attackers use to measure marketing campaign success and optimize focusing on.

To automate these operations at scale, menace actors have repurposed compromised routers into distributed SMS-spam bots.

Customized scripts cycle by recipient lists, randomize sender IDs, and rotate message templates. Some variants even combine with public paste websites to dynamically replace malicious URLs, evading static detection by URL-filtering options.

By understanding this an infection mechanism, defenders can harden their environments: implement sturdy administrative credentials, disable unused SMS interfaces, and apply firmware updates that incorporate correct authentication and rate-limiting controls.

These measures, mixed with proactive SMS-traffic monitoring, can disrupt the fast development of this stealthy and impactful menace.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:API, Cellular, Exploit, Hackers, Links, Malicious, Messages, Routers, Send, SMS, Weaponized

Post navigation

Previous Post: Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device
Next Post: New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

Related Posts

Reflectiz Now Available on the Datadog Marketplace Cyber Security News
SAP’s July 2025 Patch Day Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
How to Detect and Mitigate Insider Threats in Your Organization Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News