Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

Posted on October 24, 2025October 24, 2025 By CWS

Oct 24, 2025Ravie LakshmananData Breach / Cybercrime
The risk actors behind a large-scale, ongoing smishing marketing campaign have been attributed to greater than 194,000 malicious domains since January 1, 2024, focusing on a broad vary of providers internationally, in line with new findings from Palo Alto Networks Unit 42.
“Though these domains are registered by way of a Hong Kong-based registrar and use Chinese language nameservers, the assault infrastructure is primarily hosted on widespread U.S. cloud providers,” safety researchers Reethika Ramesh, Zhanhao Chen, Daiping Liu, Chi-Wei Liu, Shehroze Farooqi, and Moe Ghasemisharif mentioned.
The exercise has been attributed to a China-linked group often called the Smishing Triad, which is understood to flood cellular units with fraudulent toll violation and bundle misdelivery notices to trick customers into taking speedy motion and offering delicate data.
These campaigns have confirmed to be profitable, permitting the risk actors to make greater than $1 billion during the last three years, in line with a current report from The Wall Avenue Journal.

In a report revealed earlier this week, Fortra mentioned phishing kits related to the Smishing Triad are getting used to more and more goal brokerage accounts to acquire banking credentials and authentication codes, with assaults focusing on these accounts witnessing a fivefold leap within the second quarter of 2025 in comparison with the identical interval final yr.
“As soon as compromised, attackers manipulate inventory market costs utilizing ‘ramp and dump’ ways,” safety researcher Alexis Ober mentioned. “These strategies go away nearly no paper path, additional heightening the monetary dangers that come up from this risk.”
The adversarial collective is claimed to have developed from a devoted phishing package purveyor right into a “extremely lively group” that brings collectively disparate risk actors, every of whom performs a vital function within the phishing-as-a-service (PhaaS) ecosystem.
This contains phishing package builders, information brokers (who promote goal telephone numbers), area sellers (who register disposable domains for internet hosting the phishing websites), internet hosting suppliers (who present servers), spammers (who ship the messages to victims at scale), liveness scanners (who validate telephone numbers), and blocklist scanners (who examine the phishing domains in opposition to recognized blocklists for rotation).
The PhaaS ecosystem of the Smishing Triad
Unit 42’s evaluation has revealed that just about 93,200 of the 136,933 root domains (68.06%) are registered below Dominet (HK) Restricted, a registrar based mostly in Hong Kong. Domains with the prefix “com” account for a big majority, though there was a rise within the registration of “gov” domains up to now three months.
Of the recognized domains, 39,964 (29.19%) have been lively for 2 days or much less, 71.3% of them have been lively for lower than every week, 82.6% of them have been lively for 2 weeks or much less, and fewer than 6% had a lifespan past the primary three months of their registration.
“This fast churn clearly demonstrates that the marketing campaign’s technique depends on a steady cycle of newly registered domains to evade detection,” the cybersecurity firm famous, including the 194,345 totally certified domains (FQDNs) used within the resolve to as many as 43,494 distinctive IP addresses, most of that are within the U.S. and hosted on Cloudflare (AS13335).

A number of the different salient features of the infrastructure evaluation are under –

The U.S. Postal Service (USPS) is the only most impersonated service with 28,045 FQDNs.
Campaigns utilizing toll providers lures are essentially the most impersonated class, with about 90,000 devoted phishing FQDNs.
The assault infrastructure for domains producing the most important quantity of site visitors is situated within the U.S., adopted by China and Singapore.
The campaigns have mimicked banks, cryptocurrency exchanges, mail and supply providers, police forces, state-owned enterprises, digital tolls, carpooling functions, hospitality providers, social media, and e-commerce platforms in Russia, Poland, and Lithuania.

In phishing campaigns impersonating authorities providers, customers are sometimes redirected to touchdown pages that declare unpaid toll and different service costs, in some instances even leveraging ClickFix lures to trick them into working malicious code below the pretext of finishing a CAPTCHA examine.
“The smishing marketing campaign impersonating U.S. toll providers shouldn’t be remoted,” Unit 42 mentioned. “It’s as an alternative a large-scale marketing campaign with world attain, impersonating many providers throughout completely different sectors. The risk is extremely decentralized. Attackers are registering and churning by way of hundreds of domains day by day.”

The Hacker News Tags:Domains, Global, Linked, Malicious, Operation, Phishing, Smishing, Triad

Post navigation

Previous Post: Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
Next Post: Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

Related Posts

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks The Hacker News
Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger The Hacker News
Identity Security Has an Automation Problem—And It’s Bigger Than You Think The Hacker News
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave The Hacker News
$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections The Hacker News
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
  • New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer
  • SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
  • New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer
  • SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News