By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “SMS Phishing Scams Often Originating From Devices Like This”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “SMS Phishing Scams Often Originating From Devices Like This”
Technology

“SMS Phishing Scams Often Originating From Devices Like This”

Admin
Last updated: October 1, 2025 11:21 pm
Admin
Share
“SMS Phishing Scams Often Originating From Devices Like This”
SHARE

The Rise of Smishing Campaigns Using Unsecured Devices

Smishing, a blend of SMS and phishing, has emerged as a significant threat in the digital landscape. Recent research highlights a disturbing trend: malicious actors are leveraging simple, unsecured devices to execute extensive smishing operations. This discovery emphasizes the accessibility of such infrastructure for cybercriminals, who can deploy sophisticated schemes using easily obtainable tools.

Contents
The Rise of Smishing Campaigns Using Unsecured DevicesUnderstanding the VulnerabilityTechnical Countermeasures and FindingsThe Scale of the Problem

Understanding the Vulnerability

As examined by Sekoia, the means through which these devices are compromised remains unclear. One potential avenue involves a known vulnerability, CVE-2023-43261. This flaw, identified in specific router models, allowed unauthorized access due to misconfigurations that exposed sensitive files via a web interface. Notably, many of the 572 unsecured devices observed in the study were running outdated firmware versions, specifically version 32 or earlier, indicating a lack of necessary security updates.

Boost Storage: Amazon Basics 256GB Micro SDXC, 100MB/s!
Computer & Accessories

Boost Storage: Amazon Basics 256GB Micro SDXC, 100MB/s!

$19.79
Buy Now
-10% VIENON 4-Port USB 3.0 Hub: Expand Your Connectivity Easily!
Computer & Accessories

VIENON 4-Port USB 3.0 Hub: Expand Your Connectivity Easily!

$5.88 Original price was: $5.88.$5.29Current price is: $5.29.
Buy Now
-25% UGREEN Revodok 105: Ultimate 5-in-1 USB-C Hub for All Devices!
Computer & Accessories

UGREEN Revodok 105: Ultimate 5-in-1 USB-C Hub for All Devices!

$15.99 Original price was: $15.99.$11.98Current price is: $11.98.
Buy Now
Ultimate 14-in-1 USB-C Dock for Dual HDMI & 4K Support!
Computer & Accessories

Ultimate 14-in-1 USB-C Dock for Dual HDMI & 4K Support!

$49.99
Buy Now

The vulnerability provided access to cryptographically protected passwords, which, despite being encrypted, included an accompanying encryption key and initialization vector (IV) that could be exploited by adversaries for administrative access. However, the investigation by Sekoia suggests that this theory might be insufficient in explaining the situation, as some routers involved in the attacks were operating on firmware not affected by CVE-2023-43261.

Technical Countermeasures and Findings

Despite efforts from researchers to decipher how exactly the devices were compromised, certain findings contradicted the initial vulnerability theory. For example, an authentication cookie found on one of the targeted routers could not be decrypted using the supposed key and IV described in the vulnerability report. This indicates a potentially more complex method of exploitation that remains to be fully understood.

Interestingly, the phishing sites employed JavaScript that restricted the delivery of malicious content, ensuring that only mobile devices could access it. Additional measures, such as disabling right-click actions and browser debugging tools, were likely implemented to hinder reverse engineering and analysis of the sites. Further investigation revealed that these sites logged user interactions via a Telegram bot, GroozaBot, suggesting a well-organized operation led by an individual known as “Gro_oza,” who appears to be fluent in Arabic and French.

The Scale of the Problem

The sheer volume of smishing messages sent monthly raises pertinent questions about how scammers manage to sustain such extensive operations without detection. Sekoia’s findings indicate that these campaigns often rely on overlooked devices—often located in the most unexpected places like janitorial closets in industrial buildings. This chilling revelation highlights the ease with which such operations can proliferate, posing an ongoing threat to mobile users worldwide.

In conclusion, as smishing techniques evolve, understanding the underlying vulnerabilities and the infrastructure that supports these campaigns becomes crucial. Awareness and timely updates to devices are essential to minimize risk, as cybercriminals exploit every opportunity available.

For further details, you can read the full report here.

Image Credit: arstechnica.com

You Might Also Like

“Kids Choosing Landlines Over Smartphones: The Surprising New Trend”

“Visa Crackdowns Force Indian Students to Reroute Study Abroad Plans”

Ubisoft Unveils Vantage Studios for Major Franchise Development

“TikTok Control: Concerns Over US and China Influence Rise”

“Automating Science: Former OpenAI and DeepMind Researchers Secure $300M Seed Funding”

Share This Article
Facebook Twitter Copy Link Print
Previous Article “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors” “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors”
Next Article ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • Kyocera DuraXV Extreme: Ultra-Rugged Flip Phone for Adventure! Kyocera DuraXV Extreme: Ultra-Rugged Flip Phone for Adventure! $264.09
  • Unleash Sound: Koss KPH7 Lightweight Portable Headphones! Unleash Sound: Koss KPH7 Lightweight Portable Headphones! $8.59 Original price was: $8.59.$4.95Current price is: $4.95.
  • Unleash Power: ACEMAGIC 2025 LX15Pro – Your Ultimate Laptop! Unleash Power: ACEMAGIC 2025 LX15Pro - Your Ultimate Laptop! $449.99 Original price was: $449.99.$404.99Current price is: $404.99.
  • Dell Inspiron 14 5440: Power Meets Style in Carbon Black Dell Inspiron 14 5440: Power Meets Style in Carbon Black $419.00
  • Unlock Style: Samsung Galaxy A16 4G LTE 50MP Dual Cam Bundle! Unlock Style: Samsung Galaxy A16 4G LTE 50MP Dual Cam Bundle! $128.99

You Might also Like

AI Model Maintains Focus for 30 Hours on Complex Multistep Tasks
Technology

AI Model Maintains Focus for 30 Hours on Complex Multistep Tasks

Admin Admin 4 Min Read
“55 Must-Grab Deals Ahead of Amazon’s Fall Prime Day”
Technology

“55 Must-Grab Deals Ahead of Amazon’s Fall Prime Day”

Admin Admin 3 Min Read
“ChatGPT Consciousness: What to Do If You Believe It’s Sentient”
Technology

“ChatGPT Consciousness: What to Do If You Believe It’s Sentient”

Admin Admin 5 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?