By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “SMS Phishing Scams Often Originating From Devices Like This”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “SMS Phishing Scams Often Originating From Devices Like This”
Technology

“SMS Phishing Scams Often Originating From Devices Like This”

Admin
Last updated: October 1, 2025 11:21 pm
Admin
Share
“SMS Phishing Scams Often Originating From Devices Like This”
SHARE

The Rise of Smishing Campaigns Using Unsecured Devices

Smishing, a blend of SMS and phishing, has emerged as a significant threat in the digital landscape. Recent research highlights a disturbing trend: malicious actors are leveraging simple, unsecured devices to execute extensive smishing operations. This discovery emphasizes the accessibility of such infrastructure for cybercriminals, who can deploy sophisticated schemes using easily obtainable tools.

Contents
The Rise of Smishing Campaigns Using Unsecured DevicesUnderstanding the VulnerabilityTechnical Countermeasures and FindingsThe Scale of the Problem

Understanding the Vulnerability

As examined by Sekoia, the means through which these devices are compromised remains unclear. One potential avenue involves a known vulnerability, CVE-2023-43261. This flaw, identified in specific router models, allowed unauthorized access due to misconfigurations that exposed sensitive files via a web interface. Notably, many of the 572 unsecured devices observed in the study were running outdated firmware versions, specifically version 32 or earlier, indicating a lack of necessary security updates.

-50% Get Lost in Sound: Picun B8 Bluetooth Headphones, 120H Playtime!
Headphones

Get Lost in Sound: Picun B8 Bluetooth Headphones, 120H Playtime!

$24.99 Original price was: $24.99.$12.49Current price is: $12.49.
Buy Now
Raycon Everyday Wireless Headphones: 38Hr ANC & Water-Resistant!
Headphones

Raycon Everyday Wireless Headphones: 38Hr ANC & Water-Resistant!

$99.99
Buy Now
-13% LORELEI X8 Over-Ear Headphones: Tangle-Free & Travel-Ready!
Headphones

LORELEI X8 Over-Ear Headphones: Tangle-Free & Travel-Ready!

$14.99 Original price was: $14.99.$12.99Current price is: $12.99.
Buy Now
-40% Safe & Fun Kids Headphones: 85dB Volume Limit, Foldable!
Headphones

Safe & Fun Kids Headphones: 85dB Volume Limit, Foldable!

$14.99 Original price was: $14.99.$8.99Current price is: $8.99.
Buy Now

The vulnerability provided access to cryptographically protected passwords, which, despite being encrypted, included an accompanying encryption key and initialization vector (IV) that could be exploited by adversaries for administrative access. However, the investigation by Sekoia suggests that this theory might be insufficient in explaining the situation, as some routers involved in the attacks were operating on firmware not affected by CVE-2023-43261.

Technical Countermeasures and Findings

Despite efforts from researchers to decipher how exactly the devices were compromised, certain findings contradicted the initial vulnerability theory. For example, an authentication cookie found on one of the targeted routers could not be decrypted using the supposed key and IV described in the vulnerability report. This indicates a potentially more complex method of exploitation that remains to be fully understood.

Interestingly, the phishing sites employed JavaScript that restricted the delivery of malicious content, ensuring that only mobile devices could access it. Additional measures, such as disabling right-click actions and browser debugging tools, were likely implemented to hinder reverse engineering and analysis of the sites. Further investigation revealed that these sites logged user interactions via a Telegram bot, GroozaBot, suggesting a well-organized operation led by an individual known as “Gro_oza,” who appears to be fluent in Arabic and French.

The Scale of the Problem

The sheer volume of smishing messages sent monthly raises pertinent questions about how scammers manage to sustain such extensive operations without detection. Sekoia’s findings indicate that these campaigns often rely on overlooked devices—often located in the most unexpected places like janitorial closets in industrial buildings. This chilling revelation highlights the ease with which such operations can proliferate, posing an ongoing threat to mobile users worldwide.

In conclusion, as smishing techniques evolve, understanding the underlying vulnerabilities and the infrastructure that supports these campaigns becomes crucial. Awareness and timely updates to devices are essential to minimize risk, as cybercriminals exploit every opportunity available.

For further details, you can read the full report here.

Image Credit: arstechnica.com

You Might Also Like

Nothing Launches First Retail Store in India

“OpenAI Launches Rapid Coding Model on Compact Plate-Sized Chips”

“See-Through Beats Studio Buds Plus Over 40% Off for Presidents Day”

“Something Big is Happening: Misconceptions in Viral AI Post”

“Invest $1M to Learn Longevity Secrets from Bryan Johnson”

Share This Article
Facebook Twitter Copy Link Print
Previous Article “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors” “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors”
Next Article ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • Otium Bluetooth Headphones: Waterproof Sports Earbuds for Active Life! Otium Bluetooth Headphones: Waterproof Sports Earbuds for Active Life! $19.99
  • Picun B8 Bluetooth Headphones: 120H Playtime & EQ Modes! Picun B8 Bluetooth Headphones: 120H Playtime & EQ Modes! $29.99 Original price was: $29.99.$17.99Current price is: $17.99.
  • Sony WH-CH520: Ultimate Wireless On-Ear Headphones with 50H Battery Sony WH-CH520: Ultimate Wireless On-Ear Headphones with 50H Battery $59.90
  • UBeesize 67” Tripod: Perfect for Selfies & Streaming! UBeesize 67” Tripod: Perfect for Selfies & Streaming! $21.59 Original price was: $21.59.$20.51Current price is: $20.51.
  • VTech IS8121-3: Ultimate Long Range Cordless Phone Solution! VTech IS8121-3: Ultimate Long Range Cordless Phone Solution! $85.73 Original price was: $85.73.$81.47Current price is: $81.47.

You Might also Like

“Lumma Stealer Returns with Irresistible New Lures”
Technology

“Lumma Stealer Returns with Irresistible New Lures”

Admin Admin 3 Min Read
Highguard Developer Lays Off Majority of Staff Post-Launch
Technology

Highguard Developer Lays Off Majority of Staff Post-Launch

Admin Admin 2 Min Read
“AI Economy: Claude Code’s Impact on White-Collar Jobs by 2026”
Technology

“AI Economy: Claude Code’s Impact on White-Collar Jobs by 2026”

Admin Admin 6 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?