A husband's quest for justice unmasks a global smishing operation

Skye Jacobs

Posts: 579   +13
Staff
Hacking the hackers: After his wife fell victim to a smishing campaign, a security researcher initiated a personal investigation, uncovering a global operation. By hacking into the scammers' systems to gather evidence, he provided authorities with crucial information that helped end the widespread fraud campaign.

When security researcher Grant Smith received a text message claiming to be from the United States Postal Service, he initially dismissed it as another scam. However, the situation took a serious turn when his wife inadvertently entered her credit card details into the linked fraudulent website. This personal breach motivated Smith to embark on an in-depth investigation into the scam's origins.

Smith, the founder of cybersecurity firm Phantom Security, eventually uncovered a large-scale operation involving fake USPS messages designed to collect personal information, including credit card details, from unsuspecting victims. These scams directed recipients to fraudulent websites that prompted them to enter sensitive information.

Determined to trace the source of the scam, Smith identified a Chinese-language group responsible for the operation. He exploited vulnerabilities in their systems, using SQL injection and path traversal to gather evidence of their activities. The SQL injection attacks allowed him to manipulate database queries, while path traversal enabled access to files outside the web root folder.

"I started reverse engineering it, figured out how everything was being encrypted, how I could decrypt it, and figured out a more efficient way of grabbing the data," Smith told Wired.

Building on this, he managed to crack the website administrator passwords, noting that many still used default credentials like "admin" for the username and "123456" for the password. This rookie mistake enabled him to efficiently automate the extraction of victim data from the network of smishing websites. Ultimately, Smith assembled a massive data cache for authorities, including 438,669 unique credit card numbers and over 1.2 million pieces of information from 1,133 domains.

Smith's investigation revealed that the scammers used a smishing kit sold on Telegram, linked to a group known as the "Smishing Triad." The group was not unknown to security researchers, including Resecurity. The scammers operate a sophisticated cyber-criminal organization, primarily engaging in smishing campaigns targeting postal services and their customers worldwide.

The Smishing Triad sent fraudulent SMS and iMessage texts, usually impersonating reputable postal and delivery services like USPS and Royal Mail. These messages warned recipients of undeliverable packages and prompted them to provide personal details, credentials, and payment information.

They exploited the trust users place in SMS – specifically iMessage, making their scams more convincing. By using compromised Apple iCloud accounts, they bypassed traditional security measures to reach a broader audience.

Their operations also involved encrypting HTTP responses with RSA to complicate analysis and detection efforts. Other tactics included using URL-shortening services like Bit.ly to disguise malicious links and utilizing stolen databases from the dark web to enhance their targeting capabilities.

The group employed geo-filtering to target specific regions, such as the UAE and Pakistan, tailoring their attacks to local contexts and increasing their effectiveness. They had a broad operational scope that targeted postal services and their customers in multiple countries, including the US, UK, EU, UAE, and Pakistan.

An unnamed bank noticed Smith's blog posts and reached out. He shared his findings with the bank, reported the incidents to the FBI, and later provided information to the United States Postal Inspection Service (USPIS).

As it happens, Smith's actions fall into a legal gray area under the Computer Fraud and Abuse Act (CFAA) because hacking into the scammers' systems to gather evidence could be considered a violation of the CFAA. Although he won't face prosecution, authorities are concerned that the evidence collected might be inadmissible because Smith obtained it through technically illegal means.

Michael Martel, a national public information officer at USPIS, stated that postal service investigators are using the details Smith provided. However, Martel noted that he cannot comment on specific aspects of the investigation.

Image credit: Grant Smith

Permalink to story:

 
The same travesty everywhere nowadays - treating criminals as altar boys, and whistle-blowers as criminals. No wonder, nobody wants to come forward with nothing anymore. It's so fu--ed!

UPDATE

By sheer irony, curse or fate, while I was writing the above about criminals, my car outside was being vandalized at the same time, as it turned out. I am now dealing with the consequence here, and my hate for the criminals and the broken system is growing stronger. "Secure" parking, in Ireland - no such thing!
 
Last edited:
If Smith were acting on behalf of the state, then the evidence would certainly be inadmissible, but as a private actor, I'm not so sure it's that clear cut. Either way, security researchers should be granted an exception that allows them to counter-hack cyber threats. License and regulate them accordingly, but there are too many threats for the government to handle them all. It's past time for cybersecurity to be offensive, not just defensive.
 
but as a private actor, I'm not so sure it's that clear cut.
Should go double for a private actor attempting to recover or seek justice over his own loss, as it was in this case, at least initially. If there's not already a "self-defense" exception there should be. I'd also favor an automatic exemption for investigating systems in countries deemed to be "cyber unfriendly", such as having a history of hosting large scale cyber theft operations, not prosecuting offenders, and not having an extradition treaty covering these crimes.
 
Last edited:
including 438,669 unique credit card numbers
We need to stop treating mass economic disruptors as ordinary criminals. There's a point at which the matter should no longer be a police investigation and be treated as what it is, which is a mass attack on the country's citizens. Turn it over to the diplomatic, intelligence, and military services and let them apply increasing pressure using their full range of options until the attack is stopped and the ability and/or motivation for future attacks is substantially degraded.
 
This we cannot use it in court because he hacked them to get the data is bs and needs to change. The criminals do not follow the law so why should you when trying to catch them. You have to fight fire with fire.

You can get a court order to proceed.

Some things are pre-sanctioned like "murdering" the guy who tried to Kill Trump
Executions need to be sanctioned
But I believe in The USA the Potus can order murder on foreign people with an executive order.
Now The POTUS can order the killing of any USA citizen with immunity if they think it vaguely is part of their official duties, including Supreme Court Judges

In my country and probably yours the Revenue Department ( tax) have really huge powers , right to stop leaving country , right to seize any assets without court orders , right to harass with audit and home invasion without a court order etc - Given that the Tax department in my country will still normally get court orders to do these things to seem fair and reasonable

Thing is people want State to have huge power and at the same time want the State to have little power - ie it's FN hard
 
If Smith were acting on behalf of the state, then the evidence would certainly be inadmissible, but as a private actor, I'm not so sure it's that clear cut.
You are more than correct. Case law makes clear that such evidence can be used in trial. The defense can attack its credibility (no chain of custody) but not its admissibility.

Now The POTUS can order the killing of any USA citizen with immunity if they think it vaguely is part of their official duties
This has been true in the US for a very long time. This is why Obama was able to order the drone executions of several US citizens (including a 16-year boy) without trial, jury, or even charges being filed. And when a murder case was filed against Obama for the killing of the boy in question, a federal judge threw the case out on the grounds of presidential immunity.
 
This has been true in the US for a very long time. This is why Obama was able to order the drone executions of several US citizens (including a 16-year boy) without trial, jury, or even charges being filed. And when a murder case was filed against Obama for the killing of the boy in question, a federal judge threw the case out on the grounds of presidential immunity.
Well, your admiration for half stories and innuendo remains strong.
The facts are here for others that want to know what he wasnt talking about:
 
How TF was he able to do this on his own but not law enforcement ? These scams and phishing attempts have gone wild. And unfortunately there are so many data leaks like AT&T and others and there are so many people getting scammed it’s really ****ing bad. Another posing as Apple almost got my wife I was able intervene in time.
 
Now that who did what is presented to Law Enforcement you'd think the US Government would send their 'white hat' people after the hackers and attack their system with spyware so any money that comes in doesn't end up in their banks. And after they've learned everything they can they shut down the website by deleting everything, starting with the backups, and every folder, website etc connected to the hackers.
 
Well, your admiration for half stories and innuendo remains strong.
The facts are here for others that want to know what he wasnt talking about:eek:bama-drone-strikes-3-were/[/URL]

The half-truth of that link leaves out many facts, including this: when the drone operator saw that several young boys, including the American, were in the strike zone and would be killed, he refused to proceed without official confirmation. The refusal went up the chain of command all the way to the White House, where Obama himself directed the strike to proceed.

The (very Left-wing) Atlantic Magazine has more details:

 
You would think, after being told "for decades now,"NOT" to give out personal information, people would actually stop doing it. Apparently not...
 
The half-truth of that link leaves out many facts, including this: when the drone operator saw that several young boys, including the American, were in the strike zone and would be killed, he refused to proceed without official confirmation. The refusal went up the chain of command, all the way to the White House, where Obama himself directed the strike to proceed.

The (very Left-wing) Atlantic Magazine has more details:

The fact that I didn't overlook anything seems secondary when you whine about that, but it was your guy (W) and his cabinet that gave a new meaning to mindless killings and destruction that was always in the name of "justice".

You may rely on straw men for support, but I don't, though I had to post up the mindless hypocrisy of your statement. I supported the Iraq war, but I also knew that the administration seemed to go out of its way to break stuff that didn't need broken.
We have a lot of people to thank for the capture of Saddam Husein, but Bush and his handlers are none of them.
So you just give the word, and we will discuss the atrocities of war between Obama and Bush.
Accidental or not.
We can take turns, because I can give you hundreds, if not more.
 
Back