Report says your money and identity are at risk from the next wave of smishing attacks on your phone

Report says your money and identity are at risk from the next wave of smishing attacks on your phone

[ad_1]

Last month we told you that The FBI issued alert details of a serious fraud that was transferred from one state to another. The victims will receive an excessive text (through a practice called "Smishing") stating that they owe money for fees on unpaid roads. As with any tax attack, fraudsters try to pressure you to take action they want to take. In this case, the text threatens additional fines if you do not pay the unpaid amount immediately. The goal is to push you to pay the amount due by opening a page that allows you to enter your bank account or your credit card information to make such payments.

I recently got many texts and immediately deleted them. After all, if you will give the fraudsters the information they want, they cannot enter your bank account or seize your credit card account and your knocking, the attackers can even steal your identity because the information they request includes your leadership license number.

Poor actors registered 10,000 named domains ready for the next wave of attacks

The FBI noticed in its original alert that iPhone and Android users should delete any tax texts received. A new report from the Palo Alto Networks 42 dated March 6 says that The threat representative has recorded more than 10,000 field name that will be used in new attacks. The new texts are written to obtain victims to detect personal and financial information, including credit card, discount card and bank account information.

The original attacks used false texts that require payments for unpaid road balances of the state's fake outcome agencies. Based on some of the names of the new ranges registered by the threat representative, the new attacks appear to add texts related to delivery services to pressure you to make payments for the fees that do not condemn them. At the same time, while doing these payments, the threat representative hopes to reveal information about banking services and credit card along with personal identification numbers.

For repetition, armed with this information, attackers can enter your bank account and your jogging, run through your credit cards, steal your identity. Besides the fraud, be careful with false texts that pretend to be from delivery companies that you have a package but can only be delivered if you pay a small amount for the delivery fee.

The new attacks were seen in 10 American states and Canadian province, including California, Florida, Illinois, Canas, Massachusetts, Pennsylvania, New Jersey, New York, Tixas, Verginia and Canadian Ontario.

Watch out for these domain names

There is one important thing that must be noticed. Tax texts come from email addresses or phone numbers. Since IMessage does not allow links, fraud texts on this basic system will ask you to respond "Y" and reopen the text. If you do this, the attackers will be allowed to include links to the texts sent to you via IMESSAGE.

Here are some examples of the domain names that are used in this campaign:

  • dhl.com- new[.]Shin
  • - Drives.com-jds[.]Shin
  • Ezdrive.com-2h98[.]Shin
  • --ezdrivema.com-cits-tec[.]Shin
  • Ezdrivema.com-securetta[.]Shin
  • -E-zpassiag.com-coutfees[.]Shin
  • -E-zpassny.com Ticketd[.]Shin
  • - Fedex.com-fedexl[.]Shin
  • - Getipass.com- Tickeuz[.]Shin
  • Sunpass.com- Teicketap[.]Shin
  • - Theetolroads.com-fastrakeu[.]Shin
  • -Usps.com tracking helpsomg[.]Shin

You should be careful of any text you receive these days. The texts that mention one of these domain names should be deleted immediately.


[ad_2]
Download

Name is the most famous version in the series of publisher
Publisher
Genre News & Magazines
Version
Update March 12, 2025
Get it On Google Play
Rate this post
Download
Rate this post



Last month we told you that The FBI issued alert details of a serious fraud that was transferred from one state to another. The victims will receive an excessive text (through a practice called “Smishing”) stating that they owe money for fees on unpaid roads. As with any tax attack, fraudsters try to pressure you to take action they want to take. In this case, the text threatens additional fines if you do not pay the unpaid amount immediately. The goal is to push you to pay the amount due by opening a page that allows you to enter your bank account or your credit card information to make such payments.

I recently got many texts and immediately deleted them. After all, if you will give the fraudsters the information they want, they cannot enter your bank account or seize your credit card account and your knocking, the attackers can even steal your identity because the information they request includes your leadership license number.

Poor actors registered 10,000 named domains ready for the next wave of attacks

The FBI noticed in its original alert that iPhone and Android users should delete any tax texts received. A new report from the Palo Alto Networks 42 dated March 6 says that The threat representative has recorded more than 10,000 field name that will be used in new attacks. The new texts are written to obtain victims to detect personal and financial information, including credit card, discount card and bank account information.

The original attacks used false texts that require payments for unpaid road balances of the state’s fake outcome agencies. Based on some of the names of the new ranges registered by the threat representative, the new attacks appear to add texts related to delivery services to pressure you to make payments for the fees that do not condemn them. At the same time, while doing these payments, the threat representative hopes to reveal information about banking services and credit card along with personal identification numbers.

For repetition, armed with this information, attackers can enter your bank account and your jogging, run through your credit cards, steal your identity. Besides the fraud, be careful with false texts that pretend to be from delivery companies that you have a package but can only be delivered if you pay a small amount for the delivery fee.

The new attacks were seen in 10 American states and Canadian province, including California, Florida, Illinois, Canas, Massachusetts, Pennsylvania, New Jersey, New York, Tixas, Verginia and Canadian Ontario.

Watch out for these domain names

There is one important thing that must be noticed. Tax texts come from email addresses or phone numbers. Since IMessage does not allow links, fraud texts on this basic system will ask you to respond “Y” and reopen the text. If you do this, the attackers will be allowed to include links to the texts sent to you via IMESSAGE.

Here are some examples of the domain names that are used in this campaign:

  • dhl.com- new[.]Shin
  • – Drives.com-jds[.]Shin
  • Ezdrive.com-2h98[.]Shin
  • –ezdrivema.com-cits-tec[.]Shin
  • Ezdrivema.com-securetta[.]Shin
  • -E-zpassiag.com-coutfees[.]Shin
  • -E-zpassny.com Ticketd[.]Shin
  • – Fedex.com-fedexl[.]Shin
  • – Getipass.com- Tickeuz[.]Shin
  • Sunpass.com- Teicketap[.]Shin
  • – Theetolroads.com-fastrakeu[.]Shin
  • -Usps.com tracking helpsomg[.]Shin

You should be careful of any text you receive these days. The texts that mention one of these domain names should be deleted immediately.





Download

 
Report

You are now ready to download for free. Here are some notes:

  • Please check our installation guide.
  • To check the CPU and GPU of Android device, please use CPU-Z app
Rate this post

Leave a Comment

Your email address will not be published. Required fields are marked *