Smishing Triad: Chinese eCrime Group Targets 121+ Countries, Intros New Banking Phishing Kit

threat

Key Findings

  • Smishing Triad, a Chinese eCrime group, has systematically targeted organizations in at least 121 countries across numerous industries, including postal, logistics, telecommunications, transportation, finance, retail, and public sectors, with SMS phishing “smishing” campaigns.
  • Silent Push analysts have acquired Smishing Triad server log data and determined that portions of the group’s infrastructure generated over one million page visits within a period of only 20 days, averaging 50,000 per day. Based on this data, we believe the actual number of messages sent may be significantly higher than the current public estimates of 100,000 SMS messages sent per day.
  • On March 18, 2025, the developer behind the phishing kit used by Smishing Triad released a new Telegram channel detailing his new “Lighthouse” kit. Details allude to sophisticated bank phishing efforts being set up, with the initial phishing kit targeting major Western financial organizations and banks in Australia as well as the broader Asia-Pacific (APAC) region.
  • Smishing Triad boasts it has “300+ front desk staff worldwide” supporting the Lighthouse kit. The staff is apparently used to support various aspects of the fraud and cash-out schemes. Smishing Triad continues to sell its phishing kits to other threat actors via Telegram and likely other channels.
  • Domains used by Smishing Triad are rotated frequently. Silent Push researchers have seen approximately 25,000 domains online during any 8-day period—and expect to see tens of thousands of the group’s websites live on any given day. More than half of phishing sites were hosted by two Chinese hosting companies: Tencent (AS132203) and Alibaba (AS45102).

Executive Summary

Smishing Triad is an advanced e-crime group from China that has been in operation since 2023, with criminal affiliate partners operating in multiple countries. Silent Push has found evidence of this group, known primarily for its SMS phishing (“smishing”) campaigns that use postal delivery and government services as lures. These campaigns have targeted at least 121 countries and numerous industries with up to 100,000 texts daily.

In a new twist first seen in March 2025, Silent Push has discovered Smishing Triad appears to be working on new phishing kits focused on banks and financial organizations. The kits were initially focused on Australian financial institutions, but several major global financial brands have also been included.

Smishing Triad is also selling its phishing kits to other maliciously aligned threat actors via Telegram and likely other channels. These sales make it difficult to attribute the kits to any one subgroup, so the sites are currently all attributed here under the Smishing Triad umbrella. As of this writing, Silent Push Threat Analysts have seen roughly 25,000 Smishing Triad domains in use within the last 8 days, and currently over 90,000 domains across the observed lifetime of this campaign.

Background

Resecurity first wrote about the “Smishing Triad” in August 2023, with a substantial follow-up in August 2024. Their research helped provide context that this SMS phishing campaign was targeting multiple countries. It initially used compromised Apple iCloud accounts to send spam over iMessage and then later used local phone numbers. Resecurity confirmed that the SMS phishing kit was being sold to other threat actors, and they were able to acquire details to map 36 domains being used for the attacks.

In October 2023, Krebs on Security reported that a phishing campaign was targeting USPS and 12 other national postal services. These included services in Australia, Ireland, Spain, Costa Rica, Chile, Mexico, Italy, Netherlands, Denmark, Norway, Sweden, and Finland. This phishing effort appeared to be an early Smishing Triad campaign.

In 2024, security researcher Grant Smith hunted the same threat actors due to them scamming his wife with one of the USPS package scams, covered by Wired. Smith wrote up his efforts to compromise their phishing kits. He confirmed the creator of the kit was someone named “王多余” (Wang Duo Yu) who used the Telegram account “wangduuoyu0” (t[.]me/wangduoyu06). The creator originally communicated with buyers on the t[.]me/dy_tongbu channel. It was later shut down by Telegram due to Terms of Service violations. Resecurity confirmed similar details.

Screenshot of wangduoyu06's Telegram account in March 2025
Screenshot of the wangduoyu06 Telegram account, accessed March 2025

In April 2024, the FBI Internet Crime Complaint Center (IC3) noted it had received over 2,000 complaints about smishing texts related to fake toll road collection efforts, a primary lure from Smishing Triad.

In June 2024, the U.S. Postal Inspection Service issued a warning about package tracking text scams, reminding readers, “USPS utilizes the 5-digit short codes to send and receive SMS to and from mobile phones.”

In July 2024, Fortinet released a blog on Smishing Triad and helpfully noted that Apple ID allows the use of third-party email addresses. This helped explain why many of the “email-to-SMS” examples we’ve seen don’t use iCloud email addresses. The blog described the process: “We have observed third-party email addresses such as Hotmail, Gmail, or Yahoo being used in phishing emails on iMessage. Apple allows users to create an Apple ID using these third-party email addresses as the primary email associated with their Apple ID. Once the Apple ID is created and configured for iMessage, the sender can use that third-party email address to send messages through iMessage.”

Following these initial reports, there have been hundreds of significant local news reports about smishing campaigns – the vast majority do not name “Smishing Triad,” but they do mention toll road lures (aka E-ZPass phishing), USPS lures, and other government services that we’ve seen targeted via Smishing Triad domains.

In a new twist first seen in March 2025, Silent Push Threat discovered Smishing Triad appears to be working on new phishing kits to target banks and financial organizations. As mentioned in our key findings, these kits focus primarily on Australian and APAC-based financial institutions.

New Banking Focus

In January 2025, Brian Krebs from Krebs on Security was the first to cover the new “Lighthouse” branding being used by the Smishing Triad phishing kit backend software, based on his tracking of its Telegram marketing.

In February 2025, Krebs continued his publishing on Smishing Triad and highlighted their cash-out schemes and new methods for loading stolen credit cards onto iPhone digital wallets in “How Phished Data Turns into Apple & Google Wallets.” It’s important to note that while images of devices found on Telegram being used in the attacks are exclusively Apple iPhones, this is just one of the cash-out schemes to load mobile Apple wallets with stolen credit cards, and is not an indication that only Apple devices are targeted.

Screenshot of Chinese smishing kit vendor's mobile phones loaded with digital wallets for sale
Telegram channel for a popular Chinese smishing kit vendor shows 10 mobile phones for sale, each loaded with 4-6 digital wallets from different U.K. financial institutions (Krebs article)

On March 18, 2025, the developer behind the Smishing Triad phishing kit released a new Telegram channel about the creation of his new “Lighthouse” kit. Details allude to extremely sophisticated bank phishing efforts being set up. One video featured in the channel also included details of the USPS phishing template.

The new Lighthouse kit targets dozens of financial brands, many with a focus on Australia, including PayPal, Mastercard, Visa, Stripe, HSBC, Bendigo and Adelaide Bank, Bank of Sydney, Bank Australia, Bank of Queensland, Bank of Nova Scotia, Australia and New Zealand Banking Group, CitiGroup, Commonwealth Bank of Australia, Cuscal LTD, HSBC Bank Australia, ING Bank (Australia), National Australia Bank, Newcastle Permanent Building Society, Police Bank, George Bank, Westpac Banking Corporation, and Macquarie Bank.

Smishing Triad Targeting Diverse Industries in Over 121 Countries

Smishing Triad has systematically targeted organizations in at least 121 countries across numerous industries, including postal, logistics, telecommunications, transportation, finance, retail, and public sectors.

Our team has constructed the extensive lists below to show the scope of targeting, including only those countries explicitly mentioned by name in a Smishing Triad domain. Some country codes in observed domains alluded to other countries, but have been left off until stronger confirmation is found.

With nearly two-thirds of all countries in the world targeted by Smishing Triad, it’s safe to say they are essentially targeting every country with modern infrastructure outside of Iran, North Korea, and Russia. Our team has observed some potential targeting in Russia (such as domains that mentioned their country codes), but nothing definitive enough to indicate Russia is a persistent target.

Interestingly, even though these are Chinese threat actors, we have seen instances of targeting aimed at Macau and Hong Kong, both special administrative regions of China.

Geographic Scope Includes 2/3 of the World’s Countries

  • North America: United States, Canada, Mexico, Guatemala, Costa Rica, Dominican Republic, Bahamas, Belize, Cuba, El Salvador, Honduras, Jamaica, Nicaragua, Panama, and St Lucia
  • South America: Argentina, Brazil, Chile, Colombia, Ecuador, Peru, Uruguay, Bolivia, Guyana, Paraguay, and Venezuela
  • Europe: Austria, Belarus, Belgium, Bulgaria, Croatia, Czech Republic, Finland, France, Germany, Greece, Ireland, Italy, Lithuania, Moldova, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Spain, Switzerland, United Kingdom, Ukraine, Albania, Cyprus, Denmark, Estonia, Hungary, Kosovo, Latvia, Luxembourg, Macedonia, Malta, Monaco, Slovenia, Sweden
  • Middle East: Egypt, Georgia, Israel, Kazakhstan, Libya, Saudi Arabia, Turkey, United Arab Emirates, Bahrain, Iraq, Jordan, Kuwait, Kyrgyzstan, Oman, Qatar, and Turkmenistan
  • Africa: South Africa, Angola, Botswana, Congo, Ghana, Kenya, Mali, Mauritius, Morocco, Namibia, Nigeria, Seychelles, Togo, Tunisia, and Uganda
  • Asia-Pacific: Australia, Hong Kong, India, Indonesia, Japan, Malaysia, China, New Zealand, Pakistan, Philippines, Singapore, Sri Lanka, Thailand, Armenia, Brunei, Cambodia, Fiji, South Korea, Laos, Maldives, Mongolia, Taiwan, and Vietnam

Broadly Targeted Industries

  • Postal & Logistics: National postal services, private couriers, and global shipping firms (USPS, Royal Mail, La Poste, DHL, FedEx, and UPS)
  • Telecommunications: Providers in Thailand, Indonesia, Mexico, Guatemala, Malaysia, and the Dominican Republic
  • Transport & Toll Systems: Electronic toll systems in California, Hong Kong, and Spain
  • Finance, Banking & Retail: Banking institutions and multinational retail corporations
  • Government & Public Services: Law enforcement, energy infrastructure (Tokyo Electric Power), and labor ministries

Targeted Brands

Numerous organizations outside of the shipping, postal, and logistics industries are being targeted, with a secondary focus on toll road brands and financial organizations. These organizations include:

  • CitiGroup, HSBC, Mastercard, Visa, PayPal, Stripe, Australia and New Zealand Banking Group, LATAM Airlines (South America), Commonwealth Bank of Australia, National Australia Bank, Westpac Banking Corporation, Claro Cloud (Latin America), ING Bank (Australia), Macquarie Bank, Bank of Nova Scotia, Dirección General de Tráfico (DGT) (Spain), East Nippon Expressway Company (E-NEXCO) (Japan), Maxis Telecom (Malaysia), Bendigo and Adelaide Bank, HSBC Bank Australia, Bank of Queensland, Dubai Police, Bank Australia, Bank of Sydney, Cuscal LTD, George Bank, Newcastle Permanent Building Society, Police Bank, Altice Dominican Republic (Dominican Republic), M360 SMS Send (Philippines), Airpaz (Indonesia), and Macau Pass (China)

Dozens of Shipping and Mail Companies Targeted

  • North America: Amazon (U.S.), Bay Area FasTrak (California, U.S.), Canada Post, Correo El Salvador, Correos de Costa Rica, Correos de Guatemala (Guatemala Post), DHL (U.S.), Estafeta (Mexico), FedEx (U.S.), Telcel (Mexico), Telefónica México, The Toll Roads (California, U.S.), Tigo Guatemala, UPS (U.S.), and USPS (U.S.)
  • South America: 4-72 Shipping (Columbia), Agencia Nacional de Infraestructura (ANI) (Columbia), Correo Uruguayo (Uruguay), Peruvian Ministry of Labor, Servicios Postales del Ecuador, and Servientrega Post (Columbia)
  • Europe: An Post (Ireland), Aramex (Bulgaria), BelPost (Belarus), Chronopost France, Czech Posta (Czech Republic), DPD Parcel (France), Evri (U.K.), Hellenic Post (ELTA) (Greece), InPost (Poland), La Poste (France), Lietuvos Paštas (Lithuania), Mondial Relay (France), myHermes Konto (Germany), Obrasci Posta (Croatia), Post AG (Austria), Poșta Moldovei (Moldova), Poșta Română, Posten Norway, Posti Group (Finland), Poste Italiana (Italy), Public Enterprise “Pošta Srbije” (Serbia), Posturinn (Iceland), Royal Mail (U.K), Slovenská Pošta (Slovakia), Swiss Post (Switzerland), and Ukraine Post
  • Middle East: Georgian Post (Georgia), Israel Post, Qaz Post (Kazakhstan), SMSA Express (Saudi Arabia), SPL Express (Saudi Arabia), Turkish Post (PTT) (Turkey), and Yurtiçi Kargo (Turkey)
  • Africa: Algeria Post, Egypt Post, Libyan Post (Libya), and South African Post Office
  • Asia-Pacific: AIS Thailand, Australia Post, HKeToll (China), India Post, J&T Express (Asia), New Zealand Post, Pakistan Post (EP), Philippine Postal Corporation, Singapore Post, SMBC Card (Japan), Sri Lanka Post, Telkomsel (Indonesia), TEPCO (Japan), Thailand Post, and Yamato Transport (Japan)

It should be noted that all phone numbers include a country code. This makes it easy for a threat actor to send geo-targeted phishing messages even to relatively small countries like Iceland, Kosovo, or Jamaica.

In some countries, such as the U.S. and Canada, mobile phone numbers even include an area code, making regional targeting of victims (for example, when impersonating toll operators) more effective.

March 2025: New Telegram Channel from Smishing Triad Kit Developer Wang Duo Yu

Silent Push analysts discovered a new Telegram channel (t[.]me/laowang_notice) created on March 18, 2025, being used by Smishing Triad developer “Wang Duo Yu” to communicate with buyers of the smishing kit.

This access helped us better understand some of the new Smishing Triad kit’s features, targeting details, and the lures they are planning to use. A partially translated capture of the developer’s handle is:

“It is better to teach a man how to fish than to give him a fish.

The only TG: @wangduoyu0”

The most recent message also explains why Wang Duo Yu created a new one, “The old channel has been blocked, so I will use this channel to release the latest news in the future.”

Screenshot of Telegram channel confirming the Smishing Kit as "Lighthouse"
“Wang Duo Yu” Telegram channel

Access to this Telegram channel confirmed the name of the Smishing Kit as “Lighthouse.” Readers can see the Lighthouse interface here in this screenshot from one of the videos posted on Telegram in March 2025:

Screenshot of Lighthouse interface from one of the Telegram videos
Screenshot of the Lighthouse interface from Telegram

The Lighthouse description alludes to the sophistication of the bank phishing features, directly calling out how they have “300+ front desk staff worldwide”:

”【Lighthouse】E-commerce Demo

The most powerful synchronization backend: supports real-time synchronization, one-click setup, one-click update, automatic diversion, card header notes, OTP verification, APP verification, PIN verification, 3DS verification, code scanning verification, contacting banks, card replacement payment, online banking verification, points customized products, multiple customized verifications, etc., with a real interface, high bit rate, and stable operation

300+ front desk staff worldwide

Enjoy the silky smoothness, powerful beyond your imagination, with a backdoor to kill your whole family!”

The Lighthouse footer also includes a reference to the creator Wang Duo Yu with the reference, “Made with <heart> By WDY”

Smishing Triad developer Wang Duo Yu aka WDY's Telegram footer
Screenshot of the Lighthouse footer on Telegram

Other details within the Telegram channel align with past attacks and provide context for current targeting.

Smishing Triad Phishing Kit Features

The new Lighthouse phishing kit promoted on Telegram featured several options for threat actor groups that buy the tool. A translated version of the interface confirmed these options were available for admins:

  1. Customizing the directory of the “Front-end entrance” where content is shown.
  2. A country whitelist so that the page can likely only load for people on specific IP addresses
  3. A toggle to allow desktop access (most pages only render to mobile user agents)
  4. Payment price (amount charged to victim)
  5. Customized front-end verification page

Smishing Triad Lighthouse Interface from Telegram screenshot
Screenshot of Lighthouse Interface from Telegram

You can watch a full video walkthrough of the Lighthouse app from the creator himself—although it is in Mandarin—at https://youtu.be/o6lNR7zfwZ8*.

The developer posted a video detailing his Lighthouse app on YouTube

Further Confirmation of Chinese Developers

The developer of the Smishing Triad kit communicates with potential affiliate partners in Mandarin, and the text on the phishing kit’s JavaScript also contains Chinese text. The ties to China are significant and were relatively easy to confirm.

  • “当前正在首页” → “Currently on the home page.”
  • “当前已填写完成” → “Currently completed filling out.”
  • “当前正在填卡页面” → “Currently on the card filling page.”
  • “当前正在地址页面” → “Currently on the address page.”

Text example screenshot of Smishing Triad
Phishing kit text example

USPS Phishing Kit

The USPS phishing kit was one of the first launched by Smishing Triad, but it continues to see updates. The kit provides a real-time sync between the front-end phishing pages and the back-end database with features for easy viewing of victims’ data:

Screenshot of Lighthouse interface, from Telegram by @wangduoyu0
Screenshot of the Lighthouse interface, from Telegram by @wangduoyu0

Payment Tactics: Credit Card CVV Verification & QR Codes for Mobile Apps

Depending on the type of card entered in the form, an additional verification can be triggered to ensure the card can be used. You can see the Card Verification Value (CVV) prompt below:

Another screenshot of the Smishing Triad Lighthouse interface from Telegram
Screenshot of Lighthouse interface from Telegram

This triggers a screen based on the type of credit card used (American Express is featured in the USPS Phishing Kit on Telegram, example below):

Smishing Triad screenshot of American Express CVV phishing prompt from USPS Phishing Kit via Telegram
Screenshot of American Express CVV phishing prompt from the USPS Phishing Kit via Telegram

There is also a feature to support real-time purchasing so that if a threat actor is stopped from using a victim’s credit card, they can direct victims to a QR code to get a code from a mobile app.

Screenshot of the Smishing Triad QR code on the USPS phishing page
Screenshot of the QR code on the USPS phishing page

There are also screens encouraging victims to approve payments within the HSBC mobile app and requesting their transaction’s personal identification number (PIN):

Screenshot of Smishing Triad HSBC page asking the victim to approve Visa payment via mobile app
One of the USPS Phishing Kit features targets Visa and HSBC users from Telegram

Watch the full video promoting the USPS kit from the Smishing Triad developer here: https://youtu.be/307WeScSBc4.*

Smishing Triad developer Wang Duo Yu posted a video promoting the USPS phishing kit on YouTube

New PayPal Phishing Kit

The threat actor group’s Telegram channel describes the PayPal phishing kit as:

“【Lighthouse】E-commerce PayPal Update

Supports simultaneous fishing of accounts and cards”

Screenshots of the phishing pages look like this:

Screenshot of the threat actor group's Telegram channel describing the PayPal kit
Screenshot of the mobile-optimized PayPal phishing kit includes the email “ceshi@gmail[.]com”

The ceshi@gmail[.]com email address may actually be the personal email of the threat actor. It has been seen in breach files from Shein[.]com, Youku[.]com, and hiapk[.]com – all Chinese brands. It’s also been seen in some stealer logs, with one unique hand-created password being “wuppypuppy1,” which could be a pivot point into other accounts controlled by this same threat actor.

In other parts of the phishing kit infrastructure, there are references to “ceshi” like in one of the C2 subdomains, which you can see in this screen capture of the video from the Telegram channel:

Screenshot of the Lighthouse interface highlighting a C2 domain and email address
Screenshot of the Lighthouse interface, highlighting a C2 domain of “ceshi.appexpress[.]top”

The PayPal phishing kit includes a realistic SMS request page
Smishing Triad PayPal phishing kit includes a realistic SMS request page

The Smishing Triad PayPal phishing page emulates 2-factor codes
Smishing Triad PayPal phishing page for acquiring 2-factor codes

New HSBC Mastercard Phishing Kit

The Telegram channel promoting the Lighthouse tool also featured new templates for phishing HSBC Mastercard users. For unknown reasons, multiple new layouts and features were made to target HSBC customers.

The Telegram channel promoting Lighthouse featured templates for phishing HSBC Mastercard users
HSBC Mastercard phishing template from Telegram

Tracking Multiple Server Variations

Silent Push’s Threat Analysts have developed extensive fingerprints that enable our team to track the various server setups being used by Smishing Triad threat actors. The diversity in server setups hosting their phishing kits further confirms that multiple threat actors are using similar TTPs and code kits, while making their own deployment decisions.

For operational security reasons, we can’t make the queries used to track Smishing Triad public, but we are sharing 50 domain IOFAs at the bottom of this report in order to support external research.

Smishing Triad Lighthouse C2 Domains

Within the Telegram channel, the admin recorded a video that showed the testing domain they had set up, “appexpress[.]top,” which appeared to be a C2 where credentials would be sent from the phishing pages.

The admin's video in the Telegram channel showed a testing domain for phishing credentials
Screenshot of the Lighthouse walkthrough from Telegram

It appears this detail was inadvertently included as it was blurred out in previous sections of the video:

Screenshot of the Lighthouse walkthrough from Telegram
Screenshot of the Lighthouse walkthrough from Telegram

Even in that section, however, the admin messed up the blurring, and it was briefly visible in the video:

Screenshot from the video showing the admin messed up and revealed the actual domain in error
In the video screenshot, it appeared the admin revealed the testing domain they had set up, “appexpress[.]top,” by mistake

Silent Push analysts found a JavaScript file connected to this C2 in a phishing kit. We are making the file available for download. The file references a wide variety of banks and financial institutions, including several Australian finance organizations.

  • index-D76-mPwS.js

We believe this file showcases early targets of the threat actor’s new bank phishing template, and expect this group to expand targeting beyond this initial list:

  • PayPal
  • Mastercard
  • Visa
  • HSBC
  • Bendigo and Adelaide Bank
  • Bank of Sydney
  • Bank Australia
  • Bank of Queensland
  • Bank of Nova Scotia
  • Australia and New Zealand Banking Group
  • CitiGroup
  • Commonwealth Bank of Australia
  • Cuscal LTD
  • HSBC Bank Australia
  • ING Bank (Australia)
  • National Australia Bank
  • Newcastle Permanent Building Society
  • Police Bank
  • George Bank
  • Westpac Banking Corporation
  • Macquarie Bank
  • Stripe (brief reference, likely leftover code from the Stripe template)

Smishing Triad Weak Server Configurations

Silent Push Threat Analysts also discovered a vulnerability that led to an information leak from one of Smishing Triad’s phishing pages. For operational security reasons, we will only share a limited view of what was found.

Here you can see a JSON file with log records:

Screenshot of the JSON file with log records from a Smishing Triad phishing page
Log records from a Smishing Triad phishing page

When translating this information, it showed the logs included the text “Delete all card data” and “Export all card data.” This indicated these logs were actual phishing log records from Smishing Triad. Additional data indicated that this was a log from a website user.

Memo translated from Mandarin to English revealing logs with text "Delete all card data" and "Export all card data"
Brief translation reveals the memo’s meaning

Based on the information found, Silent Push Threat Analysts scanned 9,270 unique domains and narrowed the list to 450 IP addresses—all likely controlled by Smishing Triad.

Another leak revealed page visits from victims and which phishing page they visited.

The log page revealed phishing page visits
Log showing details of phishing page visits

Silent Push Threat Analysts scanned all 9,000+ unique domains for the specific attributes used here and were left with a file containing 105,500 lines of output.

Screenshot containing a small snippet of the output
A small snippet of the output

This information served as the basis for the million+ page visits referenced in the earlier section in our report. Based on the data we gathered, our team has calculated that the total number of phishing page visits was well over 1,000,000 potential victims within a 20-day time span.

Breakdown of Smishing Triad Infrastructure

Approximately 200,000 domains have been used by Smishing Triad threat actors.

Tens of thousands of Smishing Triad domains are live within any 8-day period.

The infrastructure has been hosted across over 8,800 unique IP addresses, across more than 200 different ASNs.

Notably, more than half of the phishing sites were hosted by two Chinese hosting companies: Tencent (AS132203) and Alibaba (AS45102).

Based on analysis of these results, Smishing Triad is targeting at least 121 countries (or about two-thirds of the world). This information was constructed using the domain names and favicons.

Additionally, across all of the Smishing Triad campaigns our team has been tracking, we saw about 187 top-level domain (TLD) suffixes being used. The most popular TLDs were: “.top,” “.xin,” “.vip,” “.world,” “.cc,” “.com,” “.xyz,” “.icu,” “.cfd,” and “.ink”.

Below is a small sample of impersonated companies and organizations and the relevant countries, intended to further illustrate the global reach of this campaign and the scope of the organizations being targeted:

Targeted OrganizationLegitimate WebsiteTargeted CountryFavicon MD5 HashPhishing Site
USPSusps[.]comUnited States3f0f72ed57a54b97cda500bcf0545efbinfo-trackingcoi[.]cc
Evrievri[.]comUnited Kingdom7d0229599d942f4cef13e6412fe18723evriuk[.]top
Estafetaestafeta[.]comMexicobf0b6949346d4fe168245aa2bfc61cfcestafetau[.]shop
Turkish Post (PTT)ptt[.]gov[.]trTurkey7bb31b9ef5f35d816f9bc7a816c800d7tuyrepost[.]cc
La Postelaposte[.]frFrance2e7b6d178a0468f6beaf184e854d773eposten[.]top
Correos PostCorreos[.]esSpain349246ee336d8b2986e584a4fa436128busine[.]cfd
India PostIndiapost[.]gov[.]inIndiad6d9ecedd59f3418a8425ce5e61e5695indiapost[.]top
Amazon Postamazon[.]comGlobalca6619b86c2f6e6068b69ba3aaddb7e4ewdfb[.]top
Canada Postcanadapost-postescanada[.]caCanadab97eafae41beb90b3c3279fb07fdbc45canadaapoost[.]com
Servientrega Postservientrega[.]comColombiaf264619a74d8b662e7a695c2563a9bcfbtyzywlp[.]top
Australia Postauspost[.]com[.]auAustralia5848f96af0da17512255e056da67263dauspoust[.]cc
Royal Mailroyalmail[.]comUnited Kingdom3b1e1a3f7ea2c1ae22748f963728cba6psocygb[.]xin
DHLdhl[.]comGlobald8106bf3a1d00ab43b01e6e3c92500ebpost-isl[.]sbs
Poste Italianaposte[.]itItaly3cbac548d46ec7b7794ec1d1ba11ff08posteit[.]cfd
An Postanpost[.]comIreland9a59afcbfc57b19ae71413f2b2d950a0chamge-a[.]top
Yurtiçi Kargoyurticikargo[.]comTurkeyeac1870faf46ea45a318c20563d3cf8fyurticikargoy[.]cyou
SMBC Cardsmbc-card[.]comJapan67ac939271735622b07d41dbcc90300bsmbc-card[.]shop
InPostinpost[.]plPolandc98cb827ea0cc7939a9083ecd833410einposttrack[.]click
CTT Correiosctt[.]ptPortugal782c9d4b134c4e0b632b67970d23287ecttpacks[.]click
Correos El Salvadorcorreos[.]gob[.]svEl Salvador87eebd70b533b24b2c127e7d113c3b88slvpostgob[.]ccsv
AIS Thailandais[.]thThailande9c703a4188c3c8355c1529caa76eb1aaiisoi[.]top
South African Post Officepostoffice[.]co[.]zaSouth Africac1dd8d14493c54a675ac29031713bfc0za-post-word[.]top
Slovenská Poštaposta[.]skSlovakia34541285068a8cabe10d7393ea68704dshant[.]fun
DPD Parceldpd[.]comGlobald6e8d97ca54021f46aae3e4b5fbf3208dpd-pack[.]xyz
Philippine Postal Corporationphlpost[.]gov[.]phPhilippines5e56f6ac37123d152c4f477e40a1a92dphlppovd[.]top
Swiss Postpost[.]chSwitzerlandf6e7b043a102b271d898072e24227356post-track[.]help
Czech PostaPostabo[.]czCzech Republic4053dfb4509b7c2d5a3596e2875caab1ceska-post-a[.]blog
4-72 Shipping4-72[.]com[.]coColombia12a853f2e837b036ac706f3d5160aea5address-4-72[.]top
Israel Postisraelpost[.]co[.]ilIsraelaa8806968a55f7e5e5202cb59f8b0318isr-aelpost[.]sbs
Qaz Postpost[.]kzKazakhstaned9cb0beb42ed44975095a4f2ca5cf86wbduvn[.]com
Peruvian Ministry of Labortrabajo[.]gob[.]pePeru1965fef6225a1639b0919581e37ab5cffwedsfg[.]top
Yamato Transportkuronekoyamato[.]co[.]jpJapan9e83ad80e466873a9acc652c194fa5bdwhetf[.]xin
FedExfedex[.]comGlobala53129769d15f251d4e5c5cb966765b4fexpres[.]lol
J&T Expressjtexpress[.]phSoutheast Asiab3eae70fa423635b4359de4bd9b59b00mys-jtexpres[.]cyou
Claro Cloudclarocloud[.]comLatin America1a4f0664da92aa9ca994296084d46e9ewww-claro[.]top
Lietuvos Paštaspost[.]ltLithuaniad06cf67753097487e2b29d3d0cb47ae7lietuvospost[.]help
Singapore Postsingpost[.]comSingapore3ea19204ea4c75da2cff7aff54135c09singpposts[.]top
Servicios Postales del Ecuadorserviciopostal[.]gob[.]ecEcuadoraa568cd0fc3e7c8c6d34511d0dd4e641serviciopostalgobec[.]pics
Maxis Telecommaxis[.]com[.]myMalaysia38cce9d714010a3e43132f1348454461mapxis[.]ink
Chronopost Francechronopost[.]frFrancecdf92e329cc12fa614a9b706250d8498chroonopostfrr[.]click
Poșta Moldoveiposta[.]mdMoldova2326ee2db9d78be59257b9d08be1507abusiness-poste[.]top
Egypt Postegyptpost[.]gov[.]egEgypt44fff7ded89e2c97b6b3797550a69a75egiuw[.]top
Public Enterprise “Pošta Srbije”posta[.]rsSerbia8f69a8995d3eb92cb0a35b07d05659e3postah[.]cc
Correos de Costa Ricapagos[.]correos[.]go[.]crCosta Ricaf6a5c39822bebd1071a30d77b02ca0fdcootrut[.]site
Aramexaramex[.]bgBulgariabd668e3a554306b020c5670b02e70586aramexaene[.]com
Ukraine Postukrposhta[.]uaUkrainea3765a9d883516fbf9992fb368ab4a45ukrspack[.]click
SPL Expresssplonline[.]com[.]sa/arSaudi Arabia0d738b9111bf58499f057e84b0d6c0f4spl-express[.]help
Poșta Românăposta-romana[.]roRomaniaf0806fd528a615d286a7f3398be0a002posta-romanam[.]cc
Posten NorwayPosten[.]noNorway1fa4c9a05aae4399c4ae72eab37a5cd0unogmu[.]icu
Post AGpost[.]atAustriae219d187a2e604c4feb65b4c8e838ba1at-post[.]icu
myHermes Kontomyhermes[.]deGermany47c30669b590c5539b01c28f1203dbccmyhermes-at[.]bond
Autopistasautopistas[.]comSpain386464fffd1b5b5de12fa217fb4c8962autopistes[.]asia
Telkomseltelkomsel[.]comIndonesia762c0117f77fc03c666586ca8920f5e4telkomssel[.]ink
Obrasci Postaposta[.]hrCroatiaa054771f947814ced1668f9056dda56dpost-word[.]top
TEPCOtepco[.]co[.]jpJapan454357104cfcc4afbd9f4274b755bab2tepco-co-jp[.]online
Georgian Postgpost[.]geGeorgia998950a66034565afde5b38b16a2c848geopostl[.]cfd
Hellenic Post (ELTA)elta[.]grGreecea2dcaabb983ac9e00cd561dba81e63f6eltade[.]cc
The Toll Roadsthetollroads[.]comUnited Statesb77c325bbed7cde9ed764e39301a0dfathetollroadsll[.]lol
Pakistan Post (EP)ep[.]gov[.]pkPakistan977c05b3d421bc68473bbd5dbf85578eepgovc[.]top
Telceltelcel[.]comMexicob211f84b21ccbb865ff13decfccfdb3fttspost[.]sbs
Guatemala Post (Correos de Guatemala)correos[.]gob[.]gtGuatemalaa20e946cd5fc459b3fc24aac7ba63f76coeetrttgroup[.]cfd
SMSA Expresswww[.]smsaexpress[.]comSaudi Arabia63c8ae68ffc88607adcb991403aac338smseexpress[.]cfd
Posti Groupposti[.]fiFinland9f18375658005abf5ea3ca68bba84fd1posti-fifi[.]top
UPSups[.]comGlobalafd13e52f285793f5eaa266c12a19abemxups[.]me
Tigo Guatemalatigo[.]com[.]gtGuatemala6da0a1b3f14c594ca59b2d0f5cbba8c4tigo-gtmc[.]top
Mondial Relaymondialrelay[.]comFrancecdc89ea9ddff2facd9df0854165e0dc1mondialrellay[.]live
Telefónica Méxicotelefonica[.]com[.]mxMexico0ffe21b6f2306750e5dac33036a72cb0entelclws[.]top
Sri Lanka Postslpost[.]gov[.]lkSri Lanka727dba352808dbacf07c64665221a63aslpostgovls[.]xyz
HKeTollhketoll[.]gov[.]hkHong Kong8617548fca9c005670313f8199c91b54hketoll-etc-hk[.]top
Correo Uruguayocorreo[.]com[.]uyUruguay64c6903fded3bcab9fa069e0a8510868uypos[.]xyz
M360 SMS Sendm360.com[.]phPhilippinesf5aa2599540f5470c5c6db0a9a816988globeefd[.]top
Thailand Postthailandpost[.]comThailande7a779b2a78738e30ce2056417615a4fthposto[.]vip
BelPostbelpost[.]byBelarusb69b0e9972eb5cd55852c5c4ad86f270belpost-by[.]lol
Libyan Postlibyapost[.]lyLibyae021fa39a227f70c7d74ebc1397ff555hanypost[.]top
Agencia Nacional de Infraestructura (ANI)ani[.]gov[.]coColombiaa003e0a196f18d56b5b4ef9622ab8b60adffew[.]top
New Zealand Postnzpost[.]co[.]nzNew Zealand5b8f637a20a50f9e5de34bf4fd923e3bnzposst-co[.]top

Continuing to Track Smishing Triad, Working on Takedowns

Silent Push analysts will continue to track Smishing Triad and its infrastructure. We appreciate any additional leads or research tips. We believe collaboration is key to disrupting this globe-spanning effort and welcome any additional leads. In the spirit of that:

Sharing (Smishing Messages) is Caring

Multiple research partners supported our research into the Smishing Triad at Silent Push by sharing the targeted smishing messages they were receiving. These collaborative efforts helped us confirm many new domains and also better informed our understanding of how these messages and their delivery mechanisms have evolved over time.

A small sample of what we have analyzed is included below:

USPS package at warehouse smishing message
Smishing message example: “USPS package address incomplete”

USPS incomplete address smishing message example
Smishing message example: “USPS package delivery incomplete”

Toll payment due smishing message example
Smishing message example: “Toll payment due”

Mitigation

Silent Push believes all domains associated with Smishing Triad phishing campaigns represent some level of risk. This campaign is primarily a consumer-focused phishing threat, which abuses the trademarks of major brands and organizations.

Our analysts have constructed a series of Silent Push Indicators of Future AttackTM (IOFATM) on these types of phishing efforts.

Silent Push IOFATM Feeds are available as part of an Enterprise subscription. Enterprise users can ingest IOFATM Feed data into their security stack to inform their detection protocols or use it to pivot across attacker infrastructure using the Silent Push Console and Feed Analytics screen.

Sample IOFATM List from this Campaign

Silent Push is sharing a sample Indicators of Future AttackTM (IOFATM) list we have associated with the Smishing Triad campaign to support ongoing efforts within the community. Our enterprise users have access to an IOFATM feed currently containing significantly more indicators from this campaign.

  • address-4-72[.]top
  • adffew[.]top
  • aiisoi[.]top
  • appexpress[.]top
  • aramexaene[.]com
  • at-post[.]icu
  • auspoust[.]cc
  • autopistes[.]asia
  • belpost-by[.]lol
  • btyzywlp[.]top
  • busine[.]cfd
  • business-poste[.]top
  • canadaapoost[.]com
  • ceska-post-a[.]blog
  • chamge-a[.]top
  • chroonopostfrr[.]click
  • com-billsgowkx[.]xin
  • cootrut[.]site
  • cttpacks[.]click
  • dpd-pack[.]xyz
  • egiuw[.]top
  • eltade[.]cc
  • entelclws[.]top
  • epgovc[.]top
  • estafetau[.]shop
  • evriuk[.]top
  • ewdfb[.]top
  • fexpres[.]lol
  • fwedsfg[.]top
  • globeefd[.]top
  • geopostl[.]cfd
  • hanypost[.]top
  • hketoll-etc-hk[.]top
  • indiapost[.]top
  • info-trackingcoi[.]cc
  • inposttrack[.]click
  • isr-aelpost[.]SBS
  • lietuvospost[.]help
  • mapxis[.]ink
  • mndot.us-etce[.]cc
  • mondialrellay[.]live
  • myhermes-at[.]bond
  • mys-jtexpres[.]cyou
  • mxups[.]me
  • telkomssel[.]ink
  • post-word[.]top
  • tepco-co-jp[.]online
  • thetollroadsll[.]lol
  • ttspost[.]sbs
  • coeetrttgroup[.]cfd
  • nzposst-co[.]top
  • phlppovd[.]top
  • postah[.]cc
  • posta-romanam[.]cc
  • post-isl[.]sbs
  • post-track[.]help
  • posteit[.]cfd
  • posten[.]top
  • posti-fifi[.]top
  • psocygb[.]xin
  • serviciopostalgobec[.]pics
  • shant[.]fun
  • singpposts[.]top
  • slpostgovls[.]xyz
  • slvpostgob[.]ccsv
  • smbc-card[.]shop
  • spl-express[.]help
  • smseexpress[.]cfd
  • tigo-gtmc[.]top
  • trackwpwy[.]top
  • thetollroads-errp[.]top
  • thposto[.]vip
  • tuyrepost[.]cc
  • ukrspack[.]click
  • unogmu[.]icu
  • usps-packages-dc[.]com
  • uspssud[.]info
  • uypos[.]xyz
  • wbduvn[.]com
  • whetf[.]xin
  • www-claro[.]top
  • yhvxm[.]icu
  • yurticikargoy[.]cyou
  • za-post-word[.]top