Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

0
Medium
Phishing
Published: Wed Oct 01 2025 (10/01/2025, 11:07:00 UTC)
Source: The Hacker News

Description

Unknown threat actors have been exploiting Milesight industrial cellular routers to send phishing SMS messages (smishing) targeting European users since at least February 2022. Attackers abuse the routers' SMS API, which in many cases is exposed without authentication, to send malicious SMS containing phishing URLs impersonating government, banking, postal, and telecom services. The campaign primarily targets Sweden, Italy, and Belgium, leveraging typosquatted domains and JavaScript-based evasion techniques. Approximately 572 routers worldwide, about half in Europe, remain vulnerable due to exposed inbox/outbox APIs. The exploitation is linked to a patched information disclosure vulnerability (CVE-2023-43261) disclosed two years ago. The attackers do not appear to install backdoors or exploit other flaws, focusing solely on SMS-based phishing delivery. The decentralized nature of these routers complicates detection and takedown efforts, posing a persistent threat to European organizations and users.

AI-Powered Analysis

AILast updated: 10/07/2025, 01:11:01 UTC

Technical Analysis

This threat involves the exploitation of Milesight industrial cellular routers to facilitate smishing campaigns targeting European users. The attackers leverage an exposed SMS API on these routers, which allows sending and retrieving SMS messages without authentication in many cases. This vulnerability stems from a previously disclosed information disclosure flaw (CVE-2023-43261, CVSS 7.5) that has been patched but remains unmitigated on numerous devices. The exposed API enables attackers to send phishing SMS messages containing URLs that impersonate trusted entities such as government platforms (e.g., CSAM, eBox), banks, postal services, and telecom providers. These URLs often use typosquatting to deceive recipients. The phishing pages include JavaScript that detects mobile devices before delivering malicious content, urging victims to update banking information under false pretenses. Some domains used in the campaigns implement anti-analysis techniques like disabling right-click and debugging tools and log visitor connections to a Telegram bot operated by an actor known as "Gro_oza." The attackers appear to conduct an initial validation phase by sending test SMS to numbers under their control to confirm the router's ability to send messages. The campaign has been ongoing since at least February 2022, with no evidence of additional malware or backdoors installed on the routers, indicating a focused smishing operation. Approximately 18,000 such routers are publicly accessible, with 572 assessed as vulnerable, half located in Europe. The decentralized distribution of these routers across multiple countries complicates detection and mitigation efforts. The threat highlights the risks posed by industrial IoT devices with exposed management interfaces and insufficient authentication controls.

Potential Impact

For European organizations, this threat poses a significant risk of credential theft, financial fraud, and reputational damage due to successful phishing attacks delivered via SMS. The use of industrial routers as a smishing vector enables attackers to bypass traditional email and web-based phishing defenses, increasing the likelihood of user compromise. Targeted sectors include government services, banking, postal, and telecom, which are critical infrastructure and services in Europe. Compromise of end users through these phishing messages can lead to unauthorized access to sensitive information, fraudulent transactions, and broader social engineering campaigns. The decentralized and cross-border nature of the exploited routers complicates incident response and takedown efforts, potentially prolonging exposure. Additionally, the lack of authentication on SMS APIs indicates systemic security weaknesses in industrial IoT deployments, which could be exploited for other malicious activities if left unaddressed. The campaign's persistence since 2022 underscores the ongoing threat to European digital ecosystems, particularly in Sweden, Italy, and Belgium, where vulnerable devices are concentrated.

Mitigation Recommendations

European organizations and network operators should immediately audit their Milesight industrial cellular routers to identify any devices exposing SMS inbox/outbox APIs without authentication. Firmware should be updated to the latest versions that patch CVE-2023-43261 and related vulnerabilities. Network segmentation should be enforced to isolate industrial routers from public internet access unless strictly necessary, and access controls should be implemented to restrict API usage to authorized personnel and systems. Organizations should deploy monitoring solutions to detect anomalous SMS traffic patterns originating from these routers, including unexpected outbound SMS volumes or connections to suspicious domains. User awareness campaigns should educate employees and customers about smishing risks, emphasizing verification of SMS sources and caution with links. Collaboration with telecom providers to filter and block known malicious SMS URLs and typosquatted domains can reduce exposure. Incident response plans should include procedures for rapid identification and remediation of compromised routers. Finally, manufacturers should be engaged to improve security defaults, including mandatory authentication for SMS APIs and secure configuration guidelines.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html","fetched":true,"fetchedAt":"2025-10-07T01:05:09.547Z","wordCount":1076}

Threat ID: 68e467476a45552f36e85b8b

Added to database: 10/7/2025, 1:05:11 AM

Last enriched: 10/7/2025, 1:11:01 AM

Last updated: 10/7/2025, 8:12:32 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats