Friday, April 18, 2025
HomeAndroidThreat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

Published on

SIEM as a Service

Follow Us on Google News

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified as the orchestrator behind a surge in smishing campaigns targeting consumers in the US and UK.

These campaigns exploit toll payment services like FasTrak, E-ZPass, and I-Pass, with expectations of expanding globally.

The Smishing Triad’s Modus Operandi

The group employs fraudulent text messages that appear to come from legitimate tolling agencies, demanding payment for supposed unpaid tolls or requesting sensitive information.

- Advertisement - Google News

This tactic not only aims to extract money but also to steal personal and financial data for future victimization.

The campaign’s scale is vast, utilizing over 60,000 domain names, which complicates efforts by platforms like Apple and Android to block these fraudulent activities effectively.

Cybercriminals leverage underground bulk SMS services to send millions of malicious instant messages (IM) at scale.

 Toll Payment Services

These services allow attackers to modify the Sender ID (SID) to impersonate legitimate organizations, thereby increasing the likelihood of victims responding or clicking on fraudulent links.

For instance, sending 1,000 smishing messages to UK consumers costs around $8.00, highlighting the affordability and accessibility of these services for cybercriminals.

Oak Tel: A Key Player in Smishing Operations

Resecurity has identified an underground service named “Oak Tel,” also known as “Carrie SMS,” which is frequently used by the Smishing Triad and other cybercriminals.

 Toll Payment Services
The Catalyst of Global Smishing

This service supports the SIDs of numerous US-based financial institutions, enabling attackers to craft convincing smishing messages.

The service, hosted at oak-tel[.]com, provides a web panel for managing campaigns, tracking statistics, and even allows for dynamic SMS content creation.

Mitigating smishing is challenging due to the impersonation of legitimate organizations through SID spoofing.

Consumers are advised to verify any toll-related claims through official websites, avoid clicking on links in unsolicited text messages, and report suspicious messages to authorities.

Additionally, enabling security features on smartphones, such as spam filters and message blocking, can help reduce the number of smishing attempts received.

Carriers and IM service providers are urged to enhance their spam protection mechanisms, learning from email spam protection strategies.

This includes implementing throttling, content monitoring, and improving IP and phone number reputation systems to increase the cost for threat actors and decrease the effectiveness of smishing campaigns.

The Smishing Triad’s activities underscore the need for heightened vigilance among consumers and more robust security measures from service providers to combat this growing threat.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...