Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Smishing Campaigns Exploit Cellular Routers to Target Belgium
Cyber Security

Smishing Campaigns Exploit Cellular Routers to Target Belgium

Team-CWDBy Team-CWDSeptember 30, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified wave of smishing attacks has been traced to exploited Milesight Industrial Cellular Routers.

According to research by Sekoia.io’s Threat Detection & Research (TDR) team, the routers’ APIs were abused to send phishing text messages – a tactic that has repeatedly targeted Belgian users by impersonating official government services.

The malicious activity was first detected on July 22 2025, when honeypots recorded suspicious requests. Investigators found the routers had been manipulated to send SMS messages containing phishing links, often disguised as communications from CSAM and eBox (two widely used Belgian government platforms). Messages were written in Dutch and French and consistently featured Belgium’s +32 country code.

Sekoia noted that over 19,000 routers of this type are accessible on the public internet. Of these, at least 572 are exposed to unauthenticated access, enabling attackers to send or retrieve SMS messages. Logs suggest the technique has been used since at least February 2022.

Belgium in the Crosshairs

Although campaigns have reached France, Italy, Sweden and other countries, Belgium remains the most frequent target.

Between November 2022 and July 2025, multiple distinct operations impersonated federal authentication and digital mailbox services. In June and July 2025 alone, several new phishing domains mimicking these services were registered.

The smishing campaigns often follow a validation phase: attackers test whether a compromised router can send SMS messages by directing initial texts to numbers they control. Once confirmed, the devices are used to launch mass phishing waves.

Read more on phishing tactics targeting government platforms: Home Office Phishing Scam Targets UK Immigration Sponsors

Wide-Reaching Fraud

The infrastructure supporting these campaigns appears tied to Lithuanian hosting provider Podaon, with phishing domains frequently registered through NameSilo. Some sites even employed scripts to restrict access from non-mobile devices, limiting detection by analysts.

Sekoia.io’s findings highlight how vulnerable equipment is leveraged to conduct wide-reaching fraud. The campaigns typically impersonated services such as:

A Persistent Threat

“Smishing continues to represent a significant and evolving threat,” Sekoia researchers warned.

By exploiting relatively unsophisticated devices, attackers can operate at scale, distributing fraudulent messages across multiple countries.

“In light of this, heightened vigilance remains essential. Users should be cautious of unsolicited messages – especially those containing shortened or suspicious URLs, spelling or grammatical errors or urgent calls to action,” the company explained.

“Awareness and scepticism are among the most effective defences against smishing attempts, which increasingly target both individuals and organisations on a global scale.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Android RAT Klopatra Targets Financial Data
Next Article Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.