Skip to main content

Chinese Groups Stole 115 Million US Cards in 16-Month Smishing Campaign

Medium
Published: Wed Aug 06 2025 (08/06/2025, 21:47:36 UTC)
Source: Reddit InfoSec News

Description

Chinese Groups Stole 115 Million US Cards in 16-Month Smishing Campaign Source: https://hackread.com/chinese-stole-115-million-us-cards-smishing-campaign/

AI-Powered Analysis

AILast updated: 08/06/2025, 22:02:57 UTC

Technical Analysis

This threat involves a large-scale smishing campaign attributed to Chinese threat actors that successfully stole data from approximately 115 million US payment cards over a 16-month period. Smishing, or SMS phishing, is a social engineering attack where malicious actors send fraudulent text messages to trick recipients into revealing sensitive information such as credit card details, login credentials, or installing malware. In this campaign, attackers likely sent deceptive SMS messages impersonating trusted entities such as banks, payment processors, or retailers, prompting victims to enter their card information on fake websites or directly respond with sensitive data. The campaign's duration and scale indicate a highly organized operation with significant resources and targeting capabilities. Although the campaign primarily targeted US cardholders, the tactics and infrastructure used could be adapted to target other regions, including Europe. The lack of specific technical details such as exploited vulnerabilities or malware variants limits the ability to analyze the attack vector beyond social engineering. However, the sheer volume of stolen card data suggests that the attackers leveraged extensive SMS distribution networks and possibly compromised or spoofed legitimate communication channels to increase credibility and reach. The campaign's medium severity rating reflects the significant financial and privacy impact on victims but also the reliance on user interaction and social engineering rather than direct exploitation of software vulnerabilities.

Potential Impact

For European organizations, the direct impact of this campaign may be limited if the primary targets were US cardholders. However, the threat underscores the ongoing risk of smishing attacks that can easily be adapted to European markets, especially given the widespread use of mobile payments and contactless card technologies. Financial institutions, payment processors, and retailers in Europe could face increased fraud losses, reputational damage, and regulatory scrutiny if similar campaigns emerge targeting European customers. Additionally, European consumers may be indirectly affected if stolen card data from the US is used in cross-border fraud transactions or if attackers use the same infrastructure to target European mobile users. The campaign also highlights the importance of robust customer education and multi-factor authentication to mitigate social engineering risks. European organizations involved in payment card processing should be vigilant for signs of fraud stemming from smishing and ensure compliance with PSD2 and GDPR requirements related to data protection and fraud prevention.

Mitigation Recommendations

European organizations should implement multi-layered defenses against smishing campaigns. Specific recommendations include: 1) Deploy advanced SMS filtering and threat intelligence solutions that can detect and block known malicious URLs and sender spoofing attempts. 2) Enhance customer education programs focused on recognizing smishing attempts, emphasizing that legitimate institutions will not request sensitive card information via SMS. 3) Implement strong multi-factor authentication (MFA) for all payment and account access processes to reduce the risk of credential misuse even if card data is compromised. 4) Monitor transaction patterns for anomalies indicative of fraud originating from stolen card data, including cross-border transactions. 5) Collaborate with mobile network operators to identify and shut down SMS distribution networks used by attackers. 6) Ensure compliance with PSD2’s Strong Customer Authentication (SCA) requirements and GDPR mandates for breach notification and data protection. 7) Regularly update fraud detection algorithms to incorporate intelligence from global smishing campaigns and share threat intelligence within industry groups. These targeted measures go beyond generic advice by focusing on the unique challenges posed by smishing and the payment card ecosystem.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
2
Discussion Level
minimal
Content Source
reddit_link_post
Domain
hackread.com
Newsworthiness Assessment
{"score":30.200000000000003,"reasons":["external_link","newsworthy_keywords:campaign","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["campaign"],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
false

Threat ID: 6893d105ad5a09ad00f46f3c

Added to database: 8/6/2025, 10:02:45 PM

Last enriched: 8/6/2025, 10:02:57 PM

Last updated: 8/8/2025, 10:30:49 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats