2026 Futuriom 50: Highlights →Explore

Executive Summary

In early 2025, unidentified threat actors exploited vulnerabilities in Milesight industrial cellular routers to launch a large-scale smishing campaign across Europe. By abusing the routers’ publicly exposed APIs, attackers sent malicious SMS messages containing phishing URLs directly to mobile users in countries including Sweden and Italy. This campaign has been ongoing since at least February 2022, with attackers leveraging compromised infrastructure to bypass traditional security filters, resulting in widespread delivery of credential-theft links and potential downstream attacks.

This incident highlights the increasing trend of attackers targeting edge infrastructure and IoT devices to amplify their phishing and malware operations. As threat actors shift tactics toward abusing legitimate network equipment, organizations face new regulatory and operational risks, with urgent need to secure device APIs, implement segmentation, and strengthen monitoring to counter evolving smishing threats.

Why This Matters Now

The exploitation of industrial routers for targeted phishing demonstrates a critical blind spot in infrastructure security, emphasizing the urgent need to address device and API vulnerabilities before attackers can weaponize broadly deployed equipment for large-scale, hard-to-detect campaigns.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The incident revealed insufficient API security controls and lack of network segmentation, exposing weaknesses in NIST CSF, PCI DSS 4.0, and Zero Trust compliance requirements for infrastructure components.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust network segmentation, strong east-west traffic controls, inline IPS, and egress enforcement provided by CNSF-aligned controls could have prevented unauthorized access to the routers, detected abuse of internal APIs, and blocked malicious outbound SMS and data transfers.

Initial Compromise

Control: Zero Trust Segmentation

Mitigation: Prevents unauthorized lateral access to networked infrastructure and APIs.

Privilege Escalation

Control: East-West Traffic Security

Mitigation: Detects and blocks abnormal privilege escalation or management traffic within infrastructure.

Lateral Movement

Control: Multicloud Visibility & Control

Mitigation: Enables real-time detection of suspicious lateral movement attempts.

Command & Control

Control: Inline IPS (Suricata)

Mitigation: Detects and blocks malicious or anomalous API call patterns characteristic of C2 activity.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Blocks or flags unauthorized outbound data or exfiltration channels.

Impact (Mitigations)

Rapid detection of anomalous SMS sending volumes and incident response automation limits scope.

Impact at a Glance

Affected Business Functions

  • Network Operations
  • Industrial Control Systems
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of sensitive system logs and administrator credentials, leading to unauthorized access and control over industrial routers.

Recommended Actions

  • Enforce zero trust segmentation to restrict direct access to router management interfaces and APIs.
  • Apply east-west traffic controls and monitoring to detect and prevent unauthorized privilege escalation or internal lateral movement.
  • Deploy inline IPS and egress policy enforcement to stop malicious control activity and block unauthorized outbound messaging or data.
  • Leverage centralized multicloud visibility to baseline normal infrastructure behavior and quickly identify anomalies or attacks.
  • Automate threat detection and incident response for device and network abuse scenarios, reducing window of exposure and potential impact.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image