The Smishing Deluge: China-Based Campaign Flooding Global Text Messages
A large-scale smishing campaign, attributed to the China-based Smishing Triad, is targeting global users with fraudulent SMS messages impersonating toll violations and package delivery issues. The campaign has expanded internationally, targeting critical sectors such as banking, healthcare, and law enforcement by using realistic phishing pages to harvest sensitive data. It operates via a decentralized infrastructure with over 194,000 malicious domains registered since early 2024, primarily through a Hong Kong-based registrar. This phishing-as-a-service operation leverages sophisticated social engineering to maximize victim engagement. The campaign poses a significant threat to individuals and organizations worldwide, including European entities, due to the broad targeting and sector diversity. No known exploits in the wild have been reported, but the scale and complexity indicate a persistent and evolving threat. Defenders should focus on advanced SMS filtering, user awareness, and domain monitoring to mitigate risks. The threat is assessed as medium severity given its impact on confidentiality and ease of exploitation without requiring authentication but does not directly affect system availability.
AI Analysis
Technical Summary
The Smishing Triad campaign represents a highly organized and expansive smishing (SMS phishing) operation originating from China, targeting global users with fraudulent messages that mimic legitimate notifications such as toll violations and package misdelivery alerts. Since January 2024, the adversary has registered over 194,000 malicious domains, primarily through a Hong Kong-based registrar, enabling a decentralized and resilient infrastructure to support the campaign. The attackers employ advanced social engineering techniques, crafting highly convincing phishing pages that impersonate trusted services across critical sectors including banking, healthcare, and law enforcement. Victims are lured into divulging sensitive personal and financial information, which can be leveraged for identity theft, financial fraud, or further intrusion attempts. The campaign is likely powered by a phishing-as-a-service (PhaaS) model, allowing widespread distribution and scalability. Although no direct software vulnerabilities or exploits are involved, the threat exploits human factors and the ubiquity of SMS communication. The campaign’s global reach and sector targeting increase the risk to organizations that rely on SMS for customer communication or employee notifications. The absence of a CVSS score reflects the nature of the threat as a social engineering campaign rather than a software vulnerability. The campaign’s complexity and volume of malicious domains underscore the need for coordinated detection and response strategies.
Potential Impact
For European organizations, this campaign poses significant risks primarily to confidentiality and integrity. The theft of sensitive information through smishing can lead to financial losses, regulatory penalties (especially under GDPR), reputational damage, and potential unauthorized access to corporate systems if credentials are compromised. Critical sectors such as banking and healthcare are particularly vulnerable due to the sensitive nature of their data and the trust users place in their communications. Law enforcement impersonation could disrupt public trust and complicate incident response efforts. The widespread use of SMS in Europe for two-factor authentication and customer notifications increases the attack surface. Additionally, the decentralized infrastructure and high volume of malicious domains complicate detection and blocking efforts. While the campaign does not directly impact system availability, the downstream effects of compromised credentials and data breaches could lead to operational disruptions. European organizations may also face challenges in cross-border cooperation to mitigate the threat due to the campaign’s international scope and the use of Hong Kong-based registrars.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to smishing threats. This includes deploying advanced SMS filtering solutions that leverage threat intelligence feeds to block messages from known malicious domains and phone numbers. User education campaigns must emphasize the risks of unsolicited SMS messages and train users to verify suspicious communications independently. Organizations should discourage the use of SMS-based two-factor authentication in favor of more secure methods such as hardware tokens or app-based authenticators. Monitoring and analyzing domain registrations related to the campaign can help preemptively block phishing infrastructure. Collaboration with telecom providers to identify and shut down malicious SMS sources is critical. Incident response plans should incorporate smishing scenarios, including rapid containment and notification procedures. Legal and regulatory teams should be prepared to address data breach implications under GDPR. Finally, organizations should consider threat hunting for signs of credential compromise resulting from smishing to mitigate lateral movement and further exploitation.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
Indicators of Compromise
- domain: anpost.com-pay.online
- domain: anpost.id-39732.info
- domain: canpost.id-89b98.com
- domain: dhl.de-yiore.store
- domain: e-zpass.com-emea.top
- domain: e-zpass.com-etcha.win
- domain: e-zpass.com-etcoz.win
- domain: e-zpass.com-statementzz.world
- domain: e-zpass.com-tollbiler.icu
- domain: e-zpass.org-qac.xin
- domain: e-zpass.org-yga.xin
- domain: e-zpassny.com-kien.top
- domain: e-zpassny.com-pvbfd.win
- domain: e-zpassny.com-xxai.vip
- domain: e-zpassny.gov-hzwy.live
- domain: e-zpassny.gov-tosz.live
- domain: ezpass.org-pvwh.xin
- domain: ezpassnj.gov-mhmt.xin
- domain: flde-lity.com-jw.icu
- domain: flde-lity.com-lg.icu
- domain: icloud.com-remove-device.top
- domain: irs.gov-addpayment.info
- domain: irs.gov-mo.net
- domain: irs.gov-tax.cfd
- domain: irs.org.gov-tax.icu
- domain: israeipost.co-ykk.vip
- domain: kveesh6.il-363.com
- domain: michigan.gov-etczhh.cc
- domain: michigan.gov-imky.win
- domain: pikepass.com-chargedae.world
- domain: sunpass.com-hbg.vip
- domain: usps.com-hzasr.bid
- domain: usps.com-isjjz.top
- domain: usps.com-posewxts.top
- domain: utah.gov-etcfr.win
The Smishing Deluge: China-Based Campaign Flooding Global Text Messages
Description
A large-scale smishing campaign, attributed to the China-based Smishing Triad, is targeting global users with fraudulent SMS messages impersonating toll violations and package delivery issues. The campaign has expanded internationally, targeting critical sectors such as banking, healthcare, and law enforcement by using realistic phishing pages to harvest sensitive data. It operates via a decentralized infrastructure with over 194,000 malicious domains registered since early 2024, primarily through a Hong Kong-based registrar. This phishing-as-a-service operation leverages sophisticated social engineering to maximize victim engagement. The campaign poses a significant threat to individuals and organizations worldwide, including European entities, due to the broad targeting and sector diversity. No known exploits in the wild have been reported, but the scale and complexity indicate a persistent and evolving threat. Defenders should focus on advanced SMS filtering, user awareness, and domain monitoring to mitigate risks. The threat is assessed as medium severity given its impact on confidentiality and ease of exploitation without requiring authentication but does not directly affect system availability.
AI-Powered Analysis
Technical Analysis
The Smishing Triad campaign represents a highly organized and expansive smishing (SMS phishing) operation originating from China, targeting global users with fraudulent messages that mimic legitimate notifications such as toll violations and package misdelivery alerts. Since January 2024, the adversary has registered over 194,000 malicious domains, primarily through a Hong Kong-based registrar, enabling a decentralized and resilient infrastructure to support the campaign. The attackers employ advanced social engineering techniques, crafting highly convincing phishing pages that impersonate trusted services across critical sectors including banking, healthcare, and law enforcement. Victims are lured into divulging sensitive personal and financial information, which can be leveraged for identity theft, financial fraud, or further intrusion attempts. The campaign is likely powered by a phishing-as-a-service (PhaaS) model, allowing widespread distribution and scalability. Although no direct software vulnerabilities or exploits are involved, the threat exploits human factors and the ubiquity of SMS communication. The campaign’s global reach and sector targeting increase the risk to organizations that rely on SMS for customer communication or employee notifications. The absence of a CVSS score reflects the nature of the threat as a social engineering campaign rather than a software vulnerability. The campaign’s complexity and volume of malicious domains underscore the need for coordinated detection and response strategies.
Potential Impact
For European organizations, this campaign poses significant risks primarily to confidentiality and integrity. The theft of sensitive information through smishing can lead to financial losses, regulatory penalties (especially under GDPR), reputational damage, and potential unauthorized access to corporate systems if credentials are compromised. Critical sectors such as banking and healthcare are particularly vulnerable due to the sensitive nature of their data and the trust users place in their communications. Law enforcement impersonation could disrupt public trust and complicate incident response efforts. The widespread use of SMS in Europe for two-factor authentication and customer notifications increases the attack surface. Additionally, the decentralized infrastructure and high volume of malicious domains complicate detection and blocking efforts. While the campaign does not directly impact system availability, the downstream effects of compromised credentials and data breaches could lead to operational disruptions. European organizations may also face challenges in cross-border cooperation to mitigate the threat due to the campaign’s international scope and the use of Hong Kong-based registrars.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to smishing threats. This includes deploying advanced SMS filtering solutions that leverage threat intelligence feeds to block messages from known malicious domains and phone numbers. User education campaigns must emphasize the risks of unsolicited SMS messages and train users to verify suspicious communications independently. Organizations should discourage the use of SMS-based two-factor authentication in favor of more secure methods such as hardware tokens or app-based authenticators. Monitoring and analyzing domain registrations related to the campaign can help preemptively block phishing infrastructure. Collaboration with telecom providers to identify and shut down malicious SMS sources is critical. Incident response plans should incorporate smishing scenarios, including rapid containment and notification procedures. Legal and regulatory teams should be prepared to address data breach implications under GDPR. Finally, organizations should consider threat hunting for signs of credential compromise resulting from smishing to mitigate lateral movement and further exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://unit42.paloaltonetworks.com/global-smishing-campaign"]
- Adversary
- Smishing Triad
- Pulse Id
- 68fb61809f3b37a23c463236
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainanpost.com-pay.online | — | |
domainanpost.id-39732.info | — | |
domaincanpost.id-89b98.com | — | |
domaindhl.de-yiore.store | — | |
domaine-zpass.com-emea.top | — | |
domaine-zpass.com-etcha.win | — | |
domaine-zpass.com-etcoz.win | — | |
domaine-zpass.com-statementzz.world | — | |
domaine-zpass.com-tollbiler.icu | — | |
domaine-zpass.org-qac.xin | — | |
domaine-zpass.org-yga.xin | — | |
domaine-zpassny.com-kien.top | — | |
domaine-zpassny.com-pvbfd.win | — | |
domaine-zpassny.com-xxai.vip | — | |
domaine-zpassny.gov-hzwy.live | — | |
domaine-zpassny.gov-tosz.live | — | |
domainezpass.org-pvwh.xin | — | |
domainezpassnj.gov-mhmt.xin | — | |
domainflde-lity.com-jw.icu | — | |
domainflde-lity.com-lg.icu | — | |
domainicloud.com-remove-device.top | — | |
domainirs.gov-addpayment.info | — | |
domainirs.gov-mo.net | — | |
domainirs.gov-tax.cfd | — | |
domainirs.org.gov-tax.icu | — | |
domainisraeipost.co-ykk.vip | — | |
domainkveesh6.il-363.com | — | |
domainmichigan.gov-etczhh.cc | — | |
domainmichigan.gov-imky.win | — | |
domainpikepass.com-chargedae.world | — | |
domainsunpass.com-hbg.vip | — | |
domainusps.com-hzasr.bid | — | |
domainusps.com-isjjz.top | — | |
domainusps.com-posewxts.top | — | |
domainutah.gov-etcfr.win | — |
Threat ID: 68fb62139505544a4c4d54fd
Added to database: 10/24/2025, 11:25:07 AM
Last enriched: 10/24/2025, 11:41:34 AM
Last updated: 10/25/2025, 2:01:48 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Dissecting YouTube's Malware Distribution Network
MediumJewelbug: Chinese APT Group Widens Reach to Russia
MediumTransparentTribe Targets Indian Military with DeskRAT Malware
MediumHelp Wanted: Vietnamese Actors Using Fake Job Posting Campaigns to Deliver Malware and Steal Credentials
MediumNew Shadow Escape 0-Click Attack in AI Assistants Puts Trillions of Records at Risk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.