menu
techminis

A naukri.com initiative

google-web-stories
source image

Krebsonsecurity

1w

read

236

img
dot

China-based SMS Phishing Triad Pivots to Banks

  • China-based purveyors of SMS phishing kits, known as the 'Smishing Triad,' have evolved to target customers of international financial institutions by converting phished payment card data into mobile wallets from Apple and Google.
  • The groups are expanding their cybercrime infrastructure, using innovative phishing techniques to deceive victims into sharing payment card information and one-time SMS verification codes.
  • The Smishing Triad spoofs well-known brands and targets customers globally, expanding into various industry verticals across at least 121 countries.
  • They rotate phishing domains frequently, with most hosted by Chinese companies, and they have developed advanced systems to scale their operations efficiently.
  • The threat actors exploit technical gaps in sender ID validation of messaging platforms like iMessage and RCS, allowing for high-volume, cost-effective phishing campaigns.
  • There is evidence of Chinese threat actors using specialized tools like Z-NFC to conduct fraudulent NFC transactions globally, victimizing countries outside Russia, Iran, and North Korea.
  • The Smishing Triad employs over 300 front desk staff to support their fraud activities, showcasing a significant workforce dedicated to maintaining their phishing operations.
  • Security researchers have uncovered backend management panels and backend systems used by the Smishing Triad, revealing insights into their success rates and phishing campaign strategies.
  • Financial institutions are urged to enhance security measures by moving away from SMS-based verification for card enrollment and require customers to log in to their mobile apps for added security.
  • Despite these security recommendations, the persistence of card fraud underscores the ongoing challenges faced by financial institutions and cybersecurity defenses in combating sophisticated phishing attacks.

Read Full Article

like

14 Likes

For uninterrupted reading, download the app