• 'Beyond the financial risk, there are real public safety implicat

    From TechnologyDaily@1337:1/100 to All on Friday, May 01, 2026 23:15:29
    'Beyond the financial risk, there are real public safety implications': Hackers crawled Canadian streets with SMS blasters, attacking every target in sight causing 13 million network disruptions and hacking thousands of devices

    Date:
    Fri, 01 May 2026 22:05:00 +0000

    Description:
    Hackers used vehicle-mounted SMS blasters to impersonate networks, disrupt millions of connections, and infiltrate thousands of devices across Toronto streets.

    FULL STORY ======================================================================Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Threads Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Subscribe to our newsletter Fake mobile towers forced
    phones to disconnect from legitimate networks nearby Millions of disruptions revealed how easily cellular connections can be manipulated Attackers reached thousands of devices simultaneously without telecom infrastructure
    Authorities in Canada have disclosed details of a mobile cyber operation that relied on SMS blasters mounted inside vehicles moving through urban areas.

    Three suspects drove around downtown Toronto with these hidden devices
    running in their cars, impersonating cell towers. The Toronto Police Service confirmed that this marked the first operation of its kind ever recorded in the country, with the campaign causing 13 million network disruptions in total. Article continues below You may like Belarus-based SIM farm network linked to global telecom fraud Experts reveal how fake CAPTCHAs are driving a global SMS scam campaign 'A sophisticated threat that is quietly reshaping
    the economics of digital fraud': How hackers are employing virtual cloud phones to power major scams How fake cell towers manipulate connections Investigators say the devices mimicked legitimate cellular base stations, forcing nearby phones to connect automatically due to stronger signal proximity.

    Once connected to the rogue system, phones received messages that appeared to originate from credible institutions.

    These messages often directed users to fraudulent websites designed to
    extract credentials or trigger unauthorized payments.

    Because the communication bypassed standard telecom safeguards, typical protections such as carrier-level filtering became ineffective, allowing the attackers to deliver smishing campaigns directly to inboxes at scale. Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting
    your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

    The attack reached a large number of devices simultaneously, infiltrating
    tens of thousands of mobile devices without relying on traditional telecom infrastructure.

    "What makes this particularly concerning is the scale and impact," said Toronto Police Deputy Chief Robert Johnson.

    "This wasn't targeting a single individual or business. It had the ability to reach thousands of devices at once." What to read next 'What begins as a
    phone call from 'IT support' ends with a fully instrumented network compromise': This fake tech support scam tricks employees into infecting
    their own company devices This hidden SIM flaw lets spies track your
    location, and using a VPN can't help Researchers propose drone-based system
    to boost mobile network coverage

    In such cases, users may assume that installed antivirus tools or routine malware removal practices are sufficient, yet these measures do not prevent forced network redirection at the signal level. Disruption extends beyond financial harm The effect of this rogue network is not limited to financial risks because users temporarily lose access to legitimate services.

    This interference could affect a person's ability to reach emergency assistance like the police or an ambulance when needed.

    "And beyond the financial risk, there are real public safety implications.
    For instance, when devices are diverted from legitimate networks, even briefly, it interferes with a person's ability to connect to emergency services," Johnson said.

    The SMS blasters used for the operation were custom-built and have the potential to threaten national security.

    "The ones we seized in Toronto were uniquely built, and we're not sharing those publicly for safety reasons," said Detective Sergeant Lindsay Riddell.

    Devices comparable to SMS blasters, such as IMSI catchers, can intercept and reroute communications, potentially capturing metadata or voice data. A pattern seen beyond Canada Although it is described as the first recorded
    case in Canada, similar operations have been identified internationally.

    Philippine authorities arrested two Chinese nationals in February 2026 for operating a similar scheme.

    Those suspects hired drivers to carry IMSI devices in the backs of their vehicles while loitering near key government installations, military bases, and even the U.S. Embassy.

    Similarly, police in London arrested a student from China in June 2025 for using a similar gadget from his car to send messages to victims.

    The Toronto operation has been shut down, but the vulnerability remains, and traditional security tools cannot prevent a fake cell tower from hijacking your phone's connection.

    Via Tom's Hardware Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.



    ======================================================================
    Link to news story: https://www.techradar.com/pro/security/beyond-the-financial-risk-there-are-rea l-public-safety-implications-hackers-crawled-canadian-streets-with-sms-blaster s-attacking-every-target-in-sight-causing-13-million-network-disruptions-and-h acking-thousands-of-devices


    --- Mystic BBS v1.12 A49 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)