- Phishing attack now BYPASS MULTI-FACTOR APPLICATION using real-time digital wallet Delivery tactic
- Disposable codes are no longer enough to stop scammers with mobile optimized phishing set
- Millions of victims were targeted using everyday alarms such as toll, packages and account banknote
A wave of advanced phishing campaigns traced to Chinese-speaking cyber criminal syndicates may have compromised to 115 million US payment cards in just over a year, experts have warned.
Researchers at Secalliance revealed that these operations represent a growing convergence of social engineering, real-time approval areas and phishing infrastructure designed to scale.
Investigators have identified a figure called “Lao Wang” as the original creator of a now widely adopted platform that facilitates mobile -based credentials.
Identity theft scaled through Mobile Compromis
In the middle of the campaigns, phishing kits are distributed through a telegram channel known as “Dy-Tongbu”, which has quickly gained traction among attackers.
These sets are designed to avoid detection of both researchers and platforms using geofencing, IP blocks and targeting against mobile devices.
This level of technical control allows phishing sites to reach the intended goals, while actively excluding traffic that may mark the operation.
The phishing attacks typically begin with SMS, iMessage or RCS messages that use everyday scenarios, such as toll alerts or delivery updates, to run victims against false verification pages.
Users are asked to enter sensitive personal information, followed by debit card data.
The websites are often mobile optimized to adapt to the devices that receive disposable passwords (OTP) codes, allowing immediate bypass with multiple factor approvals.
These credentials are allocated to digital wallets on devices controlled by attackers, enabling them to bypass additional verification steps normally required for card-present transactions.
Researchers described this shift to abuse of digital wallet as a “basic” change in short -fraud -methodology.
It enables unauthorized use at physical terminals, online stores and even ATMs without demanding the physical card.
Researchers have observed criminal networks that are now moving beyond Smishing campaigns.
There is growing evidence that false E -trade venues and even false brokerage platforms are used to collect credentials from unsuspecting users dealing with real transactions.
The action has grown to include revenue layers, including pre -loaded devices, false trading accounts and paid ad plants on platforms like Google and Meta.
As card issuers and banks look for ways to defend against these developing threats, standard security suites, firewall protection and SMS filters may offer limited help considering the precision involved.
Given the hidden nature of these Smishing campaigns, there is no single public database list affected cards. However, individuals can take the following steps to assess possible exposure:
- Review recent transactions
- Look for unexpected digital wallet activity
- Monitor for verification or OTP requests you did not start
- Check if your data appears in violation of message services
- Enable transaction warnings
Unfortunately, millions of users may remain unaware that their data has been exploited for large -scale identity theft and financial fraud, not relieved through traditional violations.
Via infosecurity



