Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Smishing Triad Impersonation Campaigns Expand Globally
News

Smishing Triad Impersonation Campaigns Expand Globally

Team-CWDBy Team-CWDNovember 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A growing cluster of fraudulent domains impersonating major Egyptian service providers, including Fawry, Egypt Post and Careem, has been identified during a recent threat-hunting operation.

The discovery by Dark Atlas points to an expanding campaign run by the Smishing Triad, a Chinese-speaking cybercrime group known for large-scale SMS phishing operations.

These domains appear designed to support fraud and data-harvesting schemes aimed at both individuals and organizations.

New Malicious Domains

New malicious domains were uncovered after analysts examined HTTP headers from the group’s infrastructure and used those indicators to run targeted searches on Shodan.

The process exposed additional domains mimicking global brands and financial platforms, particularly within AS132203, an infrastructure block linked to Tencent’s facilities.

Analysts found that the same network space is being used to host pages spoofing UnionPay, TikTok and other services, illustrating how broadly the Triad relies on shared hosting resources.

Read more on global smishing trends: Smishing Triad Upgrades Tools and Tactics for Global Attacks

The investigation also highlighted the group’s reliance on Telegram to promote and sell its phishing-as-a-service offerings.

Older Telegram channels led analysts to a video from a member identified as “wangduoyu8,” demonstrating the group’s customizable smishing kit. These kits can be rapidly deployed to virtual servers, automatically unpacking and configuring phishing templates that target victims across multiple regions.

The kits include international templates that mimic well-known brands. Examples identified in the investigation include:

  • Fake delivery notifications imitating DHL, Evri and UPS

  • Telecom billing alerts resembling AT&T, Movistar and Vodafone

  • Government and postal service messages linked to USPS, GOV.UK and Egypt Post

Rising Competition From Darcula

A separate but related development, detailed in the same Dark Atlas advisory, involves Darcula, a large-scale PhaaS platform operating more than 20,000 spoofed domains across 100 countries.

Netcraft reports that an upgraded version, Darcula 3.0, introduced anti-detection features, an enhanced admin panel, a card-cloning tool and AI-driven automation that allows operators to build phishing pages with a single click. Analysts warn that these upgrades will likely drive higher phishing volumes.

According to the research team, both the Smishing Triad and emerging PhaaS services like Darcula demonstrate the increasing sophistication of global phishing operations.

“Our investigation underscores the importance of proactive threat hunting, continuous monitoring of phishing infrastructure and user awareness to mitigate the risks posed by these campaigns,” Dark Atlas warned.

“As cyber-criminals continue to innovate, understanding their tactics, techniques and procedures is essential for building resilient defenses and protecting sensitive information worldwide.”

Image credit: Tamar A Soliman / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
Next Article 5 Reasons Why Attackers Are Phishing Over LinkedIn
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

How to help older family members avoid scams

October 31, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.