Sunday, April 13, 2025
HomeAndroidThreat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

Published on

SIEM as a Service

Follow Us on Google News

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified as the orchestrator behind a surge in smishing campaigns targeting consumers in the US and UK.

These campaigns exploit toll payment services like FasTrak, E-ZPass, and I-Pass, with expectations of expanding globally.

The Smishing Triad’s Modus Operandi

The group employs fraudulent text messages that appear to come from legitimate tolling agencies, demanding payment for supposed unpaid tolls or requesting sensitive information.

- Advertisement - Google News

This tactic not only aims to extract money but also to steal personal and financial data for future victimization.

The campaign’s scale is vast, utilizing over 60,000 domain names, which complicates efforts by platforms like Apple and Android to block these fraudulent activities effectively.

Cybercriminals leverage underground bulk SMS services to send millions of malicious instant messages (IM) at scale.

 Toll Payment Services

These services allow attackers to modify the Sender ID (SID) to impersonate legitimate organizations, thereby increasing the likelihood of victims responding or clicking on fraudulent links.

For instance, sending 1,000 smishing messages to UK consumers costs around $8.00, highlighting the affordability and accessibility of these services for cybercriminals.

Oak Tel: A Key Player in Smishing Operations

Resecurity has identified an underground service named “Oak Tel,” also known as “Carrie SMS,” which is frequently used by the Smishing Triad and other cybercriminals.

 Toll Payment Services
The Catalyst of Global Smishing

This service supports the SIDs of numerous US-based financial institutions, enabling attackers to craft convincing smishing messages.

The service, hosted at oak-tel[.]com, provides a web panel for managing campaigns, tracking statistics, and even allows for dynamic SMS content creation.

Mitigating smishing is challenging due to the impersonation of legitimate organizations through SID spoofing.

Consumers are advised to verify any toll-related claims through official websites, avoid clicking on links in unsolicited text messages, and report suspicious messages to authorities.

Additionally, enabling security features on smartphones, such as spam filters and message blocking, can help reduce the number of smishing attempts received.

Carriers and IM service providers are urged to enhance their spam protection mechanisms, learning from email spam protection strategies.

This includes implementing throttling, content monitoring, and improving IP and phone number reputation systems to increase the cost for threat actors and decrease the effectiveness of smishing campaigns.

The Smishing Triad’s activities underscore the need for heightened vigilance among consumers and more robust security measures from service providers to combat this growing threat.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...