By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “SMS Phishing Scams Often Originating From Devices Like This”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “SMS Phishing Scams Often Originating From Devices Like This”
Technology

“SMS Phishing Scams Often Originating From Devices Like This”

Admin
Last updated: October 1, 2025 11:21 pm
Admin
Share
“SMS Phishing Scams Often Originating From Devices Like This”
SHARE

The Rise of Smishing Campaigns Using Unsecured Devices

Smishing, a blend of SMS and phishing, has emerged as a significant threat in the digital landscape. Recent research highlights a disturbing trend: malicious actors are leveraging simple, unsecured devices to execute extensive smishing operations. This discovery emphasizes the accessibility of such infrastructure for cybercriminals, who can deploy sophisticated schemes using easily obtainable tools.

Contents
The Rise of Smishing Campaigns Using Unsecured DevicesUnderstanding the VulnerabilityTechnical Countermeasures and FindingsThe Scale of the Problem

Understanding the Vulnerability

As examined by Sekoia, the means through which these devices are compromised remains unclear. One potential avenue involves a known vulnerability, CVE-2023-43261. This flaw, identified in specific router models, allowed unauthorized access due to misconfigurations that exposed sensitive files via a web interface. Notably, many of the 572 unsecured devices observed in the study were running outdated firmware versions, specifically version 32 or earlier, indicating a lack of necessary security updates.

-20% EdgeRest PostureUp L-Shaped Desk: Ultimate Wrist Comfort!
Computer & Accessories

EdgeRest PostureUp L-Shaped Desk: Ultimate Wrist Comfort!

$59.99 Original price was: $59.99.$47.99Current price is: $47.99.
Buy Now
Marshall Major V: Ultimate Black Wireless Bluetooth Headphones
Headphones

Marshall Major V: Ultimate Black Wireless Bluetooth Headphones

$99.99
Buy Now
-53% Sonix Puffy Laptop Sleeve: Stylish Protection for Your Tech!
Computer & Accessories

Sonix Puffy Laptop Sleeve: Stylish Protection for Your Tech!

$39.99 Original price was: $39.99.$18.99Current price is: $18.99.
Buy Now
Maximize Productivity with the Dell Pro Dock WD25!
Computer & Accessories

Maximize Productivity with the Dell Pro Dock WD25!

$221.15
Buy Now

The vulnerability provided access to cryptographically protected passwords, which, despite being encrypted, included an accompanying encryption key and initialization vector (IV) that could be exploited by adversaries for administrative access. However, the investigation by Sekoia suggests that this theory might be insufficient in explaining the situation, as some routers involved in the attacks were operating on firmware not affected by CVE-2023-43261.

Technical Countermeasures and Findings

Despite efforts from researchers to decipher how exactly the devices were compromised, certain findings contradicted the initial vulnerability theory. For example, an authentication cookie found on one of the targeted routers could not be decrypted using the supposed key and IV described in the vulnerability report. This indicates a potentially more complex method of exploitation that remains to be fully understood.

Interestingly, the phishing sites employed JavaScript that restricted the delivery of malicious content, ensuring that only mobile devices could access it. Additional measures, such as disabling right-click actions and browser debugging tools, were likely implemented to hinder reverse engineering and analysis of the sites. Further investigation revealed that these sites logged user interactions via a Telegram bot, GroozaBot, suggesting a well-organized operation led by an individual known as “Gro_oza,” who appears to be fluent in Arabic and French.

The Scale of the Problem

The sheer volume of smishing messages sent monthly raises pertinent questions about how scammers manage to sustain such extensive operations without detection. Sekoia’s findings indicate that these campaigns often rely on overlooked devices—often located in the most unexpected places like janitorial closets in industrial buildings. This chilling revelation highlights the ease with which such operations can proliferate, posing an ongoing threat to mobile users worldwide.

In conclusion, as smishing techniques evolve, understanding the underlying vulnerabilities and the infrastructure that supports these campaigns becomes crucial. Awareness and timely updates to devices are essential to minimize risk, as cybercriminals exploit every opportunity available.

For further details, you can read the full report here.

Image Credit: arstechnica.com

You Might Also Like

Quantum Computers Require Far Less Power to Break Crucial Encryption

“Apple at 50: Celebrating Half a Century of Innovation”

“Agentic AI: Understanding the Alignment Problem and Future Implications”

“Apple Protects Emails from Apps, But Not Law Enforcement”

AI Music Revolution: The Latest Innovations and Trends

Share This Article
Facebook Twitter Copy Link Print
Previous Article “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors” “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors”
Next Article ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • Unlock Creativity: Motorola Moto G Stylus 5G – 50MP Camera Unlock Creativity: Motorola Moto G Stylus 5G - 50MP Camera $158.97
  • Discover the Dell Latitude 5340: Power & Versatility Redefined! Discover the Dell Latitude 5340: Power & Versatility Redefined! $1,749.99 Original price was: $1,749.99.$1,099.99Current price is: $1,099.99.
  • Unlock Your World: Cat S62 Pro Rugged Phone with Thermal Imager! Unlock Your World: Cat S62 Pro Rugged Phone with Thermal Imager! $349.99
  • HP 15.6” Touch Laptop: Power Meets Style in Silver! HP 15.6” Touch Laptop: Power Meets Style in Silver! $659.99 Original price was: $659.99.$389.90Current price is: $389.90.
  • Unleash Power: ASUS Vivobook S16 | AMD Ryzen 7, 1TB SSD! Unleash Power: ASUS Vivobook S16 | AMD Ryzen 7, 1TB SSD! $1,199.99 Original price was: $1,199.99.$989.99Current price is: $989.99.

You Might also Like

“Adult Braces: Lindy West’s Memoir Sparks Polyamory Controversy”
Technology

“Adult Braces: Lindy West’s Memoir Sparks Polyamory Controversy”

Admin Admin 4 Min Read
“Attie: Bluesky Introduces AI for Personalized Feed Creation”
Technology

“Attie: Bluesky Introduces AI for Personalized Feed Creation”

Admin Admin 5 Min Read
Suno Unveils v5.5: Enhanced Customization Features Take Center Stage
Technology

Suno Unveils v5.5: Enhanced Customization Features Take Center Stage

Admin Admin 4 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?