Skip to main content

DMV-Themed Phishing Campaign Targeting U.S. Citizens

Medium
Published: Fri Jun 20 2025 (06/20/2025, 19:26:02 UTC)
Source: AlienVault OTX General

Description

A sophisticated phishing campaign impersonating U.S. state Departments of Motor Vehicles emerged in May 2025, using SMS phishing and deceptive websites to harvest personal and financial data. Victims received messages about unpaid toll violations, directing them to fake DMV sites requesting extensive information. Technical analysis revealed shared infrastructure, consistent domain naming, and indicators of a China-based threat actor. The campaign used spoofed SMS numbers, often from the Philippines, and email addresses from obscure domains. Phishing websites followed a pattern using state IDs and specific TLDs. Infrastructure analysis showed connections to known malicious IP addresses and Chinese DNS providers. The campaign's widespread impact prompted alerts from multiple states and federal authorities.

AI-Powered Analysis

AILast updated: 06/21/2025, 13:07:57 UTC

Technical Analysis

The DMV-themed phishing campaign identified in May 2025 is a sophisticated social engineering attack primarily targeting U.S. citizens by impersonating state Departments of Motor Vehicles (DMVs). The attackers employ SMS phishing (smishing) techniques, sending messages that claim the recipient has unpaid toll violations. These messages include links to deceptive websites designed to mimic official DMV portals. Victims who follow these links are prompted to enter extensive personal and financial information, which the threat actors harvest for potential fraudulent use. Technical analysis reveals that the campaign uses shared infrastructure and consistent domain naming conventions, indicating a coordinated and well-organized operation. The phishing websites follow a pattern incorporating state identifiers and specific top-level domains (TLDs), enhancing their credibility. The campaign infrastructure is linked to known malicious IP addresses and Chinese DNS providers, suggesting a China-based threat actor. Spoofed SMS numbers, often originating from the Philippines, and email addresses from obscure domains are used to obfuscate the source and evade detection. Although the campaign is focused on U.S. citizens, the use of global infrastructure and the nature of phishing attacks mean that the threat could potentially affect users outside the U.S. The campaign has prompted alerts from multiple U.S. states and federal authorities due to its widespread impact. No direct exploitation of software vulnerabilities is involved; rather, the attack relies on social engineering and deception to compromise victims' confidentiality and financial security.

Potential Impact

For European organizations, the direct impact of this campaign is limited since the phishing messages and websites are tailored specifically to U.S. DMV services and toll violations. However, the campaign demonstrates advanced smishing and phishing techniques that could be adapted to target European citizens or organizations in the future. European entities with expatriate U.S. citizens or those providing services to U.S. clients might see indirect effects, such as compromised personal data or financial fraud attempts. Additionally, the campaign highlights the evolving tactics of China-based threat actors using international infrastructure, which could signal broader risks to European organizations from similar phishing or smishing campaigns. The compromise of personal data through such campaigns can lead to identity theft, financial loss, and reputational damage. European organizations involved in telecommunications or SMS gateway services should be aware of SMS spoofing risks and the potential for their infrastructure to be abused in similar campaigns. Overall, while the immediate threat to European organizations is low, the campaign underscores the importance of vigilance against sophisticated social engineering attacks and the potential for cross-border threat actor activity.

Mitigation Recommendations

1. Implement advanced SMS filtering and anti-spoofing technologies at the telecom and enterprise level to detect and block spoofed SMS messages, especially those mimicking government agencies. 2. Educate employees and customers about smishing threats, emphasizing skepticism of unsolicited messages about fines or violations and the importance of verifying URLs before clicking. 3. Deploy domain monitoring tools to detect and take down phishing domains that mimic official government or organizational websites, focusing on patterns such as state IDs and suspicious TLDs. 4. Collaborate with telecom providers and international partners to trace and block malicious SMS sources, particularly those originating from known abuse regions like the Philippines. 5. Enhance endpoint security with URL reputation services and browser protections that warn users about deceptive websites. 6. For organizations with U.S. ties, implement multi-factor authentication and monitor for unusual access patterns that could indicate credential compromise from phishing. 7. Share threat intelligence related to phishing infrastructure and indicators of compromise with European cybersecurity information sharing platforms to improve collective defense. 8. Regularly audit and update incident response plans to include smishing and phishing scenarios, ensuring rapid containment and user notification.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.checkpoint.com/research/dmv-themed-phishing-campaign-targeting-u-s-citizens"]
Adversary
null
Pulse Id
6855b5ca7c50402db6baae4c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4de9cf08288cf9e043a784f462bd3179
hash6265e1d412213086aadbd6c6b681f55d
hash42fa6f8de4152662c103c064df411da86d3450ed
hash546ab60df89b426f7eb57958e300d03011eb8c55
hash288f3cb007f3ad99835a541b6be7e07f64aa7f7a56025518f02a1f0af41585b0
hash2f71a0956b7f073735dab092b0fb8e4c222538cf0a6bbdf7517a02ece6934157
hash5c7b246ec5b654c6ba0c86c89ba5cbaa61d68536efc32283da7694ed8e70b16d
hash5df0fcc2b6b3d3e52fb635c0b7bac41d27b5b75cbfeb16c024d66a59657d5535
hash94126506523ebbf35ec9689f593d061453ab39395bf63098464dcbc270ee7f48
hashe88b894cc69c4f4ec5f6fdb2e7a0314601241571bf02154412c0168973fdc4df

Threat ID: 68568e6baded773421b59a8a

Added to database: 6/21/2025, 10:50:19 AM

Last enriched: 6/21/2025, 1:07:57 PM

Last updated: 8/15/2025, 3:37:37 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats