Categories: Cyber Security News

Threat Actors Use Cellular Router API to Flood Phones with Weaponized Links

In late June 2025, Sekoia.io’s Threat Detection & Research (TDR) team observed anomalous POST requests to Milesight Industrial Cellular Routers, which triggered the mass distribution of phishing SMS messages.

By exploiting an unauthenticated API endpoint at /cgi, attackers dispatched JSON-formatted payloads that invoked SMS delivery functions. Initial traces were recorded on 22 July 2025, all linked to IP address 212.162.155.38 within AS Podaon SIA.

Attack Vector and Honeypot Insights

Sekoia.io deployed honeypots emulating Milesight UR5X and UR32L routers to monitor edge-device traffic.

Honeypot logs revealed repeated POST requests carrying parameters such as function: "send_sms"  base: “api_sms”, alongside JSON values specifying recipient numbers and message content.

Unauthenticated calls to query_outbox and query_inbox exposed SMS histories, including transmission timestamps, message texts, international phone formats, and delivery statuses.

Numerous “failed” statuses to the exact controlled numbers suggest a validation step: attackers first verify each router’s SMS capability before launching full-scale campaigns. This approach reduces wasted effort on non-functional devices and serves as an indicator for clustering attack campaigns.

Scale of Exposure and Campaign Dynamics

A comprehensive Shodan census identified over 19,000 Milesight routers publicly reachable on the internet. Sekoia.io tested a subset of 6,643 IPs, discovering 572 routers with unauthenticated access to their SMS APIs.

CSAM Phishing page

Firmware versions 32.2.x.x and 32.3.x.x accounted for the majority of vulnerable devices, though two routers on firmware 41.0.0.2 and 41.0.0.3 were also exposed.

Geographic distribution skews heavily toward Europe, with France, Belgium, and Turkey hosting the highest concentrations of at-risk devices. Smishing sample analysis dates back to February 2022, indicating an enduring campaign.

Two primary SMS distribution patterns emerge: simultaneous mass blasts and repeated, targeted subset campaigns.

For instance, in May 2025, attackers transmitted identical messages to 42,044 Swedish numbers and 31,353 Italian numbers via domains like estrk.xyz/SE and jnsi.xyz/IT, exemplifying mass-drip strategies.

Regional Smishing Variations

Belgian recipients experienced the most persistent targeting, with campaigns impersonating CSAM and eBox the nation’s federal authentication portal and centralized digital mailbox.

Typosquatted domains such as csam.ebox-login.xyz and ebox.csam-trust.xyz delivered Dutch- and French-language lures urging users to view “important messages” or process “annual tax returns” using weaponized shortened URLs.

French victims encountered a wider range of impersonations, spanning health insurance (assurancemaladie-renouvellement.info), postal services (logistique-infosms-laposte.fr), and banking (service-interbancaire.page.dev).

All phishing pages enforce mobile-only access via JavaScript ontouchstart checks, returning HTTP 500 errors for desktop clients. Obfuscated scripts detect_device.js and maghat_lebssouch.js—Disable right-click and debugger functions, hindering forensic analysis.

Infrastructure and Threat Actor Profiling

Domain registration data points to NameSilo and hosting on Podaon SIA VPS servers. Phishing infrastructure pivots include GitHub-hosted “GroozaV2” assets and a Telegram bot “GroozaBot” for real-time visitor logging.

Linguistic artifacts in JavaScript logs and Telegram chat snippets reveal the actor operates in Arabic and French and has connections to Thailand.

ebox.csam-trust[.]xyz url scan analysis

The use of multiple autonomous systems in Lithuania (AS210895) and Russia (AS211860) for distinct clusters underscores operational sophistication and redundancy. This modular, mobile-gated architecture enables region-specific lures and rapid domain turnover.

Mitigation Strategies and Recommendations

The exploitation of SMS-capable routers for smishing campaigns underscores the urgency of securing IoT and edge devices. Organizations should perform the following actions:

  • Audit all cellular router APIs and enforce authentication on SMS functions.
  • Upgrade firmware to versions beyond the vulnerable 32.x and 41.x series.
  • Restrict API access through network segmentation and firewall rules.
  • Continuously monitor edge-device traffic for anomalous POST requests to /cgi.
  • Educate users to scrutinize unsolicited SMS links, especially those that use URL shorteners or impersonate trusted services.

Heightened vigilance, combined with proactive patch management and infrastructure monitoring, is crucial to disrupt smishing operations that exploit misconfigured routers to scale SMS weaponization.

IoCs

CSAM/Ebox – Domains

csam.ebox-login[.]xyz
ebox.e-login[.]xyz
ebox.plus-billing[.]sbs
ebox.csam-trust[.]xyz
ebox[.]c-sam[.]xyz
login.csam-terugbetaling[.]work
ebox.c-sam[.]xyz
csam.e-box[.]help

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Threat Actors Use Cellular Router API to Flood Phones with Weaponized Links appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Take-Two Boss Says Borderlands’ Last-Minute Art Style Change Cost $50 Million, but Without It the Game Would Have Flopped

Borderlands’ well-documented 11th hour art style change cost Take-Two an extra $50 million in development…

4 minutes ago

Terraria Marks 15 Years and 70 Million Players With a Promise to Continue Updates Beyond 1.4.6 and Crossplay Patch

Terraria developer Re-Logic has confirmed that updates will continue "beyond" the 1.4.6 update and the…

53 minutes ago

GTA 6 Release Date About 18 Months Behind Original Target, Take-Two Boss Reveals, Suggesting Spring 2025 Was Once the Goal Internally

GTA 6 is due out November 19, 2026, but as we all know it’s suffered…

53 minutes ago

Jodi’s Journal: Combatting the ‘reading recession’

May 17, 2026 As the last day of school in Sioux Falls approaches this week,…

2 hours ago

Read Joan Didion’s Lost Interview with the Grateful Dead (1967)

Without wanting to make too broad a generalization, it’s safe to say that Saturday Evening Post…

2 hours ago

Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922

Microsoft has officially acknowledged a critical installation failure affecting its May 2026 Patch Tuesday cumulative…

3 hours ago

This website uses cookies.