Executive Summary
In 2024, security researchers attributed a global smishing campaign to a threat group known as the Smishing Triad, which registered more than 194,000 malicious domains since January 1. Utilizing infrastructure predominantly registered through Hong Kong-based providers with Chinese nameservers, the actors orchestrated widespread phishing via SMS attacks targeting banking, logistics, and other sectors. Victims received highly targeted text messages that redirected them to credential-harvesting sites, leading to financial fraud and data compromise. The campaign’s scale and global reach underline the adversaries’ operational sophistication and heavy use of automation.
This incident reflects a broader surge in phishing tactics leveraging SMS and vast domain infrastructure, bypassing traditional email security. The growing adoption of QR and mobile-first communication further widens the threat surface, putting regulatory and compliance emphasis on new vectors.
Why This Matters Now
With mobile device reliance and digital transformation accelerating, attackers are increasingly exploiting SMS as an entry point. The vast number of malicious domains and evolving deception tactics present urgent risks for organizations, regulators, and individuals trying to secure credentials and sensitive data from emerging identity-driven threats.
Attack Path Analysis
Attackers initiated the campaign by sending smishing messages leading victims to carefully crafted malicious domains to steal credentials. Once access was gained to users' cloud services or SaaS accounts, adversaries aimed to escalate privileges using replayed or phished credentials. The attackers could then move laterally within cloud or SaaS environments, targeting additional services or sensitive data. Communication back to attacker infrastructure was established through the malicious domains for command and control, often using encrypted protocols to evade monitoring. Stolen credentials or sensitive data were exfiltrated to attacker-controlled servers through covert outbound channels. The operation ultimately resulted in account compromise, potential business disruption, and further phishing propagation.
Kill Chain Progression
Initial Compromise
Description
Victims were lured via SMS phishing (smishing) to visit attacker-controlled domains, where they entered cloud or SaaS credentials.
MITRE ATT&CK® Techniques
Phishing: Spearphishing via SMS
Acquire Infrastructure: Web Services
Compromise Infrastructure: Domains
Phishing for Information
User Execution: Malicious Link
Valid Accounts
Impair Defenses
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Secure Authentication for Personnel
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Art. 6
CISA ZTMM 2.0 – Continuously Detect & Prevent Phishing Attacks
Control ID: User Pillar: Detect and Prevent Phishing
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Art. 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Banking/Mortgage
Financial institutions face severe phishing risks targeting customer credentials through smishing campaigns, requiring enhanced egress security and threat detection capabilities for regulatory compliance.
Telecommunications
Telecom providers are primary attack vectors for smishing operations, needing comprehensive traffic monitoring and zero trust segmentation to prevent infrastructure exploitation and customer targeting.
Retail Industry
Retail sector vulnerable to large-scale phishing targeting customer payment data and credentials, requiring multicloud visibility and encrypted traffic protection for PCI compliance.
Health Care / Life Sciences
Healthcare organizations face critical phishing threats to patient data systems, demanding robust anomaly detection and east-west traffic security for HIPAA compliance protection.
Sources
- Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operationhttps://thehackernews.com/2025/10/smishing-triad-linked-to-194000.htmlVerified
- The Smishing Deluge: China-Based Campaign Flooding Global Text Messageshttps://unit42.paloaltonetworks.com/global-smishing-campaign/Verified
- Massive China-Linked Smishing Campaign Leveraged 194,000 Domainshttps://www.securityweek.com/massive-china-linked-smishing-campaign-leveraged-194000-domains/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, egress controls, and cloud-native traffic visibility—as enabled by CNSF-aligned controls—would have limited the attack by restricting attacker movement, detecting anomalous traffic, and blocking suspicious outbound exfiltration to malicious domains.
Control: Threat Detection & Anomaly Response
Mitigation: Early detection and alerting of suspicious authentication patterns and phishing domain access.
Control: Zero Trust Segmentation
Mitigation: Limits the attacker's ability to use stolen credentials for lateral access within segmented cloud environments.
Control: East-West Traffic Security
Mitigation: Blocks unauthorized service-to-service communications and alerts on anomalous internal flows.
Control: Cloud Firewall (ACF) & Egress Security & Policy Enforcement
Mitigation: Prevents outbound C2 channel establishment to untrusted or malicious domains/IPs.
Control: Egress Security & Policy Enforcement
Mitigation: Detects and blocks data exfiltration attempts over unauthorized outbound channels.
Provides centralized detection and rapid containment of compromised accounts and resources.
Impact at a Glance
Affected Business Functions
- Banking
- E-commerce
- Healthcare
- Law enforcement
- Social media
Estimated downtime: 7 days
Estimated loss: $1,000,000,000
The campaign led to the exposure of sensitive personal information, including National Identification Numbers (such as Social Security numbers), home addresses, payment details, and login credentials.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust segmentation and least-privilege policies across all cloud workloads and SaaS accounts.
- • Implement strict egress filtering and FQDN-based policy controls to block access to malicious domains and prevent data exfiltration.
- • Deploy threat detection and anomaly response tools to monitor authentication flows and identify suspicious login or traffic patterns.
- • Leverage centralized multicloud visibility to rapidly detect, investigate, and contain incidents across distributed cloud environments.
- • Regularly review and tighten workload-to-workload security posture with automated microsegmentation and cloud-native firewalling.



