By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “SMS Phishing Scams Often Originating From Devices Like This”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “SMS Phishing Scams Often Originating From Devices Like This”
Technology

“SMS Phishing Scams Often Originating From Devices Like This”

Admin
Last updated: October 1, 2025 11:21 pm
Admin
Share
“SMS Phishing Scams Often Originating From Devices Like This”
SHARE

The Rise of Smishing Campaigns Using Unsecured Devices

Smishing, a blend of SMS and phishing, has emerged as a significant threat in the digital landscape. Recent research highlights a disturbing trend: malicious actors are leveraging simple, unsecured devices to execute extensive smishing operations. This discovery emphasizes the accessibility of such infrastructure for cybercriminals, who can deploy sophisticated schemes using easily obtainable tools.

Contents
The Rise of Smishing Campaigns Using Unsecured DevicesUnderstanding the VulnerabilityTechnical Countermeasures and FindingsThe Scale of the Problem

Understanding the Vulnerability

As examined by Sekoia, the means through which these devices are compromised remains unclear. One potential avenue involves a known vulnerability, CVE-2023-43261. This flaw, identified in specific router models, allowed unauthorized access due to misconfigurations that exposed sensitive files via a web interface. Notably, many of the 572 unsecured devices observed in the study were running outdated firmware versions, specifically version 32 or earlier, indicating a lack of necessary security updates.

-50% USB C Headphones: 2 Packs for iPhone & Samsung S25!
Headphones

USB C Headphones: 2 Packs for iPhone & Samsung S25!

$15.99 Original price was: $15.99.$7.99Current price is: $7.99.
Buy Now
-30% Ultimate 13-in-1 USB C Dock: Triple Display & 8 Ports!
Computer & Accessories

Ultimate 13-in-1 USB C Dock: Triple Display & 8 Ports!

$79.99 Original price was: $79.99.$55.99Current price is: $55.99.
Buy Now
-10% Unleash Precision with ATTACK SHARK X3 Wireless Gaming Mouse!
Computer & Accessories

Unleash Precision with ATTACK SHARK X3 Wireless Gaming Mouse!

$41.99 Original price was: $41.99.$37.79Current price is: $37.79.
Buy Now
-20% Fast 118W MacBook Pro Charger: Power Up Your Devices!
Computer & Accessories

Fast 118W MacBook Pro Charger: Power Up Your Devices!

$29.98 Original price was: $29.98.$23.98Current price is: $23.98.
Buy Now

The vulnerability provided access to cryptographically protected passwords, which, despite being encrypted, included an accompanying encryption key and initialization vector (IV) that could be exploited by adversaries for administrative access. However, the investigation by Sekoia suggests that this theory might be insufficient in explaining the situation, as some routers involved in the attacks were operating on firmware not affected by CVE-2023-43261.

Technical Countermeasures and Findings

Despite efforts from researchers to decipher how exactly the devices were compromised, certain findings contradicted the initial vulnerability theory. For example, an authentication cookie found on one of the targeted routers could not be decrypted using the supposed key and IV described in the vulnerability report. This indicates a potentially more complex method of exploitation that remains to be fully understood.

Interestingly, the phishing sites employed JavaScript that restricted the delivery of malicious content, ensuring that only mobile devices could access it. Additional measures, such as disabling right-click actions and browser debugging tools, were likely implemented to hinder reverse engineering and analysis of the sites. Further investigation revealed that these sites logged user interactions via a Telegram bot, GroozaBot, suggesting a well-organized operation led by an individual known as “Gro_oza,” who appears to be fluent in Arabic and French.

The Scale of the Problem

The sheer volume of smishing messages sent monthly raises pertinent questions about how scammers manage to sustain such extensive operations without detection. Sekoia’s findings indicate that these campaigns often rely on overlooked devices—often located in the most unexpected places like janitorial closets in industrial buildings. This chilling revelation highlights the ease with which such operations can proliferate, posing an ongoing threat to mobile users worldwide.

In conclusion, as smishing techniques evolve, understanding the underlying vulnerabilities and the infrastructure that supports these campaigns becomes crucial. Awareness and timely updates to devices are essential to minimize risk, as cybercriminals exploit every opportunity available.

For further details, you can read the full report here.

Image Credit: arstechnica.com

You Might Also Like

“The Phone is Dead: What’s Next for Communication Technology?”

OneXSugar Wallet: First Folding Screen Gaming Handheld Debuts

“Meta Acquires Manus: The AI Startup Everyone’s Buzzing About”

“Gallery TV: LG Unveils Art-Display Innovation at CES 2026”

“Unlocking ChatGPT App Integrations: DoorDash, Spotify, Uber, and More”

Share This Article
Facebook Twitter Copy Link Print
Previous Article “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors” “Snapdragon X2 Elite Extreme Outperforms Leading Intel and AMD Processors”
Next Article ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck ROG Xbox Ally Handhelds Fall Short Against Asus ROG Ally and Steam Deck
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • LG gram 15: Ultra-Light Laptop with AMD Ryzen AI Power! LG gram 15: Ultra-Light Laptop with AMD Ryzen AI Power! $1,449.99 Original price was: $1,449.99.$1,249.99Current price is: $1,249.99.
  • Smart Ring: Sleep Apnea & Health Tracker, No App Fees! Smart Ring: Sleep Apnea & Health Tracker, No App Fees! $69.99
  • STREBITO 142-Piece Precision Screwdriver Set: Ultimate Tech Toolkit! STREBITO 142-Piece Precision Screwdriver Set: Ultimate Tech Toolkit! $27.99
  • Capture Every Angle: Dual Screen 128G Action Camera! Capture Every Angle: Dual Screen 128G Action Camera! $149.99 Original price was: $149.99.$99.99Current price is: $99.99.
  • Upgrade Your Experience: E7 Active Noise Cancelling Headphones! Upgrade Your Experience: E7 Active Noise Cancelling Headphones! $46.99

You Might also Like

UltraGear Evo Gaming Monitors Launched with Advanced AI Upscaling
Technology

UltraGear Evo Gaming Monitors Launched with Advanced AI Upscaling

Admin Admin 3 Min Read
“Jobs Hiring: Understanding the US Economy’s Struggles in 2025”
Technology

“Jobs Hiring: Understanding the US Economy’s Struggles in 2025”

Admin Admin 7 Min Read
“Syntax Hacking: Sentence Structures Evade AI Safety Measures”
Technology

“Syntax Hacking: Sentence Structures Evade AI Safety Measures”

Admin Admin 3 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?