Cyber Security News

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that is enabling large-scale cyberattacks worldwide.

By exploiting trust and leveraging advanced automation, this malicious platform empowers attackers to conduct high-volume phishing campaigns with devastating results.

How Phishing Works Through SMS

Imagine an employee receives a seemingly legitimate text message from their bank: “Suspicious activity detected on your account.

Click here to secure your account.” Or perhaps a message mimicking IT support: “Your password will expire soon. Click here to reset it.” 

At first glance, these messages appear credible, often tricking recipients into clicking malicious links or sharing sensitive information.

Using tools like Devil-Traff, cybercriminals can send thousands of such fraudulent messages within minutes.

A single misstep—such as entering credentials into a phishing site—can lead to compromised accounts, unauthorized access to sensitive systems, or even large-scale data breaches.

What Is Devil-Traff?

As per a report by Slash Next, Devil-Traff is a bulk SMS service that has become a favorite amongst cybercriminals.

Its features include customizable sender IDs, API integration for automated campaigns, and support for “black content,” which refers to malicious or illegal messaging.

The official sales thread for Devil-Traff SMS platform

These capabilities allow attackers to impersonate trusted organizations such as banks, government offices, or tech companies.

For example, cybercriminals might send messages appearing to be from “PayPal Support,” alerting users to suspicious activity and urging them to click a fraudulent link.

Another common attack involves intercepting one-time passwords (OTPs). By posing as service providers, attackers can trick victims into revealing OTPs, bypassing two-factor authentication (2FA), and gaining access to sensitive accounts.

Part of the user dashboard for Devil-Traff SMS platform

Devil-Traff’s primary strength lies in its advanced automation and scalability. Through API integration, attackers can automate entire phishing campaigns with minimal manual effort, sending thousands of SMS messages across multiple countries in minutes.

The platform also uses macros to optimize delivery rates and bypass spam filters, ensuring a higher success rate for phishing attempts.

At a cost as low as $0.02 per message, Devil-Traff is an affordable and highly efficient tool for cybercriminals.

The popularity of bulk SMS platforms like Devil-Traff is rising within cybercrime forums, where users exchange tips, phone number databases, and strategies for optimizing campaigns.

These marketplaces even offer private routes—for example, using specific sender IDs such as “Binance Support”—to maximize the effectiveness of targeted attacks.

As SMS phishing attacks increase in sophistication, experts urge organizations and individuals to remain vigilant.

In a hyper-connected world, it only takes one click to compromise a network. Platforms like Devil-Traff serve as a stark reminder that cybersecurity must evolve as quickly as the threats it seeks to combat.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance decentralized…

8 minutes ago

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your digital…

13 minutes ago

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt sensitive…

2 hours ago

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege…

2 hours ago

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited,…

4 hours ago

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems to…

5 hours ago