Wednesday, April 23, 2025
HomeCyber Security NewsSmishing Campaign Hits Toll Road Users with $5 Payment Scam

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road users across the United States.

The campaign, which has been active since October 2024, impersonates toll road payment services, luring unsuspecting victims into revealing their personal and financial information through fraudulent payment requests.

The Scam Unveiled

The smishing campaign revolves around deceptively simple tactics. Targeted individuals receive SMS messages claiming they owe a small toll payment of less than $5.

- Advertisement - Google News

These messages often warn of steep late fees, compelling recipients to act quickly by visiting a link included in the text.

The fraudsters use typosquatted domains resembling legitimate toll payment websites, displaying state-specific abbreviations like “FL” for Florida or “TX” for Texas to appear authentic.

Sample phishing SMS messages
Sample phishing SMS messages

Once victims click the link, they’re directed to a fake webpage that uses logos and branding mimicking official toll services, such as EZPass.

The site prompts users to complete a CAPTCHA verification and enter their name, ZIP code, and other details. Victims are then presented with a fabricated toll bill and a warning of hefty penalties for delayed payments.

Clicking “Proceed Now” transfers individuals to another fake webpage, where they are asked to input sensitive information like their address, phone number, and credit card details – all of which are ultimately stolen by the attackers.

A Deep Web Operation

Cisco Talos’ investigation reveals that the smishing campaign is likely driven by financially motivated cybercriminal groups using smishing kits developed by an individual known as “Wang Duo Yu.”

These kits, found in underground Telegram channels and forums, enable threat actors to conduct sophisticated phishing operations targeting toll systems, banks, and postal services.

Public Lao Wang Synchronized Source Code Development Tutorial Telegram channel
Public Lao Wang Synchronized Source Code Development Tutorial Telegram channel

The phishing modules are highly customizable, allowing attacks to scale across multiple states and entities.

Talos further notes that the domains used in this campaign were registered in October and November 2024, with ongoing activity observed as recently as March 2025.

The infrastructure supporting the attacks appears well-maintained, reflecting a high degree of organization among the perpetrators.

Implications and Security Measures

This smishing campaign is a stark reminder of the growing prevalence of SMS phishing schemes and the need for vigilance among users.

Wang Duo Yu marketing the kits in telegram channels
Wang Duo Yu marketing the kits in telegram channels

Threat actors are leveraging publicly leaked information from large data breaches to tailor their attacks, though there is no definitive evidence linking these campaigns to specific data leaks, such as the 2024 National Public Data breach.

Users are advised to stay cautious when receiving payment requests via SMS and avoid clicking on suspicious links.

 Legitimate toll authorities rarely send payment reminders through unsolicited texts. Instead, users should verify outstanding bills directly on the official websites of toll road operators.

Authorities and cybersecurity firms are urging businesses to bolster their defenses against such attacks.

Cisco recommends tools like Secure Endpoint, Secure Firewall, and Umbrella to detect and block malicious activities associated with smishing campaigns.

Multi-factor authentication, network traffic monitoring, and secure internet gateways are among the measures that can safeguard users and organizations from phishing threats.

As cybercriminals continue to refine their tactics, the emergence of toll road-related smishing scams underscores the importance of awareness, robust security measures, and vigilant online behavior.

By educating users and deploying advanced cybersecurity solutions, the risks posed by such campaigns can be minimized, protecting personal and financial information from exploitation.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...