Smishing is a type of cyberattack in which attackers use SMS (text messages) to trick individuals into revealing the following type of Personal and financial data or information:-
In attacks like this, threat actors mimic government, bank, or postal agencies like USPS to seem legitimate, tricking victims into sharing payment info for fake fees.
Recently, cybersecurity researchers at RSecurity uncovered a new extensive smishing campaign dubbed “Smishing Triad,” in which threat actors are actively targeting the citizens of the United States.
Besides the US, researchers also unveiled that in earlier incidents, threat actors targeted victims from several other countries:-
Here below, we have mentioned all the entities that the operators of this campaign mimicked:-
USPS warns of summer package tracking text scams via SMS/iMessage, noting a surge in August with many attacker-registered a huge number of domains.
In this latest campaign, ‘Smishing Triad’ threat actors employed compromised Apple iCloud accounts to send malicious messages solely through iMessage.
This shift set it apart from the following previous scams, which relied on traditional SMS or calls:-
Furthermore, these perpetrators are supplying other cybercriminals with tailor-made ‘smishing kits,’ available for purchase through a group in Telegram.
On August 27, through iMessage, a victim received a fraudulent message from a compromised and threat actor-controlled Apple iCloud account (mjlozak@icloud[.]com).
Resecurity found “Smishing Triad” using “.top” domains via NameSilo, which Cloudflare protects, and analyzing texts and DNS history the earlier domains were found to be registered in the following zones:-
Here below we have mentioned all the domains that were identified by the security experts:-
Threat actors mimic the delivery failures with familiar routes that are sourced from hacked online shops.
They often pinpoint the billing and location details of the victims, and besides this, some craftily accurate routes distract the victims from verifying the source.
Smishing Triad targets ID theft and financial fraud, supplying custom kits to cybercriminals for $200/month. After crypto payment, they give activation codes and scripts for the following frameworks:-
Online shopping sites were also attacked by the operators of the ‘Smishing Triad,’ from which they steal customer data by injecting malicious code.
Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.
Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…
Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…
A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…
GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…
A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…
Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series…