Thursday, February 27, 2025
HomeAndroidHackers Exploit the SMS Gateway to Sent Text Millions of U.S Phone...

Hackers Exploit the SMS Gateway to Sent Text Millions of U.S Phone Numbers

Published on

SIEM as a Service

Follow Us on Google News

Hackers who have compromised SmartTVs, Chromecast devices and thousands of vulnerable printers to promote PewDewPie Youtube channel, now back to form and exploits the SMS gateways to send a text to millions of Peoples in the U.S.

Hackers with the name of @j3ws3r, @0xGiraffe in Twitter, taking advantage of the vulnerability that resides in the SMS gateways that are used by businesses to send mass text messages to users.

Hackers said that paid SMS services provide email gateways are extremely vulnerable, and a simple PHP command can send an SMS message to any number used by major mobile phone networks.

How did they Exploit SMS gateways

Initially, Hacktivist @j3ws3r separates a U.S phone number from 32GB list of 7.2 billion potential phone numbers by writing a script that would help to isolate the U.S phone numbers by applying pre-existing US area codes.

Later they were used the filtered list to send an email to every U.S number that they have generated via mailx, a Unix command, through SMS gateways.

Hackers specifically target the 26 different email addresses, which are act as a gateway for major U.S ISP networks.

https://twitter.com/JoshPescatore/status/1156755662027788288

According to Hacktivist @j3ws3r who have shared details in private conversation to Wired, “From my private research a malicious person could easily screw up lots of phones, Malicious actors could use this to phish or get people to click on links they shouldn’t,” 

He also shared the Screenshot of the text message that posed as it comes from nsa.gov domain email address that is completely spoofed addresses to trick users to click on a link associated with it.

This kind of vulnerabilities in SMS gateways let attackers perform phishing on the victims that tricks to steal the personal data and the attacker also can infect the device with malware and spy on the user’s device activities.

“@j3ws3r says phones on AT&T, the United States’ largest mobile phone network, wouldn’t be able to block mass spoofed messages. “Instead of receiving one text from the spoofed email, for some reason AT&T randomises it,” he says. “If I sent 1,000 messages to an AT&T phone using their gateway you’ll get 1,000 separate messages that you can’t block since they aren’t from one sender.”

Hacktivist sent the messages to only very few to the targeted numbers  Because of the large scale of the phone numbers they’re trying to target, their script is likely to take some time to run and it is clearly showing the failing blocked by network operators.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms

The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100...