Keepnet – AI-powered human risk management platform logo
Menu
HOME > blog > unmasking the smishing triad a deep dive into the china based cyber fraud network

Unmasking the Smishing Triad: A Deep Dive into the China-Based Cyber Fraud Network

Explore the latest Smishing Triad campaign analysis — how this China-linked cybercriminal network runs massive smishing operations, its global impact, recent evolution, economic scale, and practical defenses to protect individuals and organizations.

Unmasking the Smishing Triad: A Deep Dive into the China-Based Cyber Fraud Network

Smishing is now one of the fastest-growing cybercrime methods, and the Smishing Triad is one of the most dangerous networks behind it. Their operations span dozens of countries, thousands of fake domains, and billions in financial fraud.

What Is the Smishing Triad? (Quick Definition)

The Smishing Triad is a China-linked cybercriminal network that runs large-scale SMS phishing (smishing) campaigns worldwide. These attacks impersonate trusted brands to steal personal data, banking credentials, and one-time passcodes through fake mobile websites.

Origin and Modus Operandi of Smishing Triad

Diving deeper into the origins and workings of the Smishing Triad, it becomes evident that this group has meticulously crafted a unique and effective approach to cybercrime. Originating from China, the group has carved a niche in cyber threats, leveraging innovative techniques and exploiting vulnerabilities to further its malicious agenda.

Smishing allows the group to cast a wide net, reaching many potential victims and increasing the chances of successful attacks. The messages often contain urgent calls to action, prompting recipients to click on malicious links or provide personal details, ultimately leading to identity theft and financial loss.

How Smishing Triad Works ( Step-by-step)
How Smishing Triad Works (step-by-step)

What distinguishes the Smishing Triad from other cyber-criminal entities is their exclusive utilization of iMessage as a medium for disseminating scams. This platform, associated with Apple devices, is generally perceived as secure, adding more credibility to the group’s deceptive messages.

The group’s ingenuity doesn’t stop there; they have managed to compromise Apple iCloud accounts, enabling them to send iMessages that appear legitimate and bypassing the usual security protocols. This compromise of iCloud accounts amplifies the reach of their smishing campaigns and poses a significant challenge for cybersecurity experts aiming to curb their activities.

The Smishing Triad’s adeptness at exploiting technological vulnerabilities and its innovative approach to smishing demonstrate high sophistication and adaptability. Their ability to infiltrate secure communication channels like iMessage and compromise iCloud accounts highlights the evolving nature of cyber threats and the necessity for continuous advancements in cybersecurity measures.

How the Smishing Triad Attack Works (Step-by-Step)

Smishing Triad campaigns follow a repeatable fraud pipeline:

  • Victims receive a realistic SMS lure
  • A shortened or spoofed link redirects to a fake site
  • Users enter sensitive information (card data, login, OTP)
  • Data is stolen instantly or sold on underground markets
  • Domains rotate rapidly to evade takedown efforts

With its roots in China, the Smishing Triad has emerged as a formidable player in the cybercrime landscape. Their specialized use of smishing, coupled with their exploitation of iMessage and iCloud accounts, underscores the multifaceted nature of their operations and the pressing need for heightened awareness and robust security solutions to counteract such threats.

Real Smishing Triad Text Message Examples

Smishing Triad messages often use urgency and fear. Common lures include:

  • “Your package is awaiting delivery. Confirm your address now.”
  • “Unpaid toll fee detected. Pay immediately to avoid penalties.”
  • “Bank security alert: Verify your account within 30 minutes.”
  • “Your mobile payment has been suspended. Reactivate now.”

Check our guide, to see more Smishing examples.

Impersonation and Targets of Smishing Triad

In their pursuit of illicit gains, the Smishing Triad has demonstrated a remarkable ability to impersonate a wide array of postal and delivery services across the globe. This impersonation tactic is a cornerstone of their strategy, enabling them to gain the trust of unsuspecting individuals and thereby facilitate their fraudulent activities.

CapabilityWhat to check
Global Brand Impersonation (Postal & Delivery)Smishing Triad frequently impersonates trusted postal and delivery brands to exploit user trust and drive clicks to fake tracking/payment pages.
Commonly Impersonated ServicesWatch for lures referencing major carriers such as Royal Mail (UK), USPS (US), Correos (Spain), PostNord (Sweden), Poste Italiane (Italy), Poczta Polska (Poland), J&T Express (Indonesia), and New Zealand Post.
High-Trust Messaging StrategyMessages create urgency using delivery failures, pending packages, address confirmation, or small fee/payment prompts to increase click-through rates.
Expansion to E-commerce TargetsBeyond logistics brands, campaigns also target online shopping and e-commerce ecosystems to reach high-volume consumer transactions.
Web Injection / Malicious Code AttemptsSome operations attempt to inject malicious code into online shopping sites (or compromise third-party scripts) to intercept customer transaction data.
Data Interception During CheckoutLook for signs of credential theft, payment card skimming, session hijacking, and exfiltration of personal data during login or checkout flows.
Stolen Data MonetizationCollected credentials and card data may be used for account takeover, identity theft, fraudulent purchases, and resale on underground markets.
Business Impact and Risk ScopeImpersonation increases customer support load, reputational damage, fraud losses, and regulatory exposure—especially for retail, logistics, and payment-heavy sectors.

Impersonation and Targets of Smishing Triad

The multifaceted impersonation tactics and targeting strategies employed by the Smishing Triad reveal the depth of their operations and the potential risks posed to individuals and businesses worldwide. The need for vigilance, enhanced security measures, and consumer awareness has never been more critical in the face of such sophisticated and evolving cyber threats.

Fraud-as-a-Service Network

Delving further into the intricate web woven by the Smishing Triad, we uncover a sophisticated Fraud-as-a-Service Network that is the backbone of their expansive operations. This network is a testament to the group’s entrepreneurial spirit in cybercrime and a glaring indication of the multifaceted nature of modern digital threats.

CapabilityWhat to check
Smishing Kits Sold on TelegramSmishing toolkits are advertised and distributed in encrypted Telegram groups, enabling low-skill actors to launch SMS phishing campaigns.
Pre-Built Scripts & Activation CodesKits include message templates, scam scripts, and activation mechanisms that streamline setup and execution of smishing campaigns.
Cybercriminal Collaboration EcosystemThe network collaborates with other threat actors to share tactics, infrastructure, and resources, increasing attack sophistication and reach.
Cybercrime-as-a-Service InfrastructureInfrastructure supports broader criminal services (e.g., phishing platforms and stolen data markets) that make cybercrime easier to scale.
Subscription-Based Business ModelSmishing kits are sold via tiered subscriptions, turning fraud operations into repeatable, commercial-style services.
Low Barrier to EntryEntry pricing (reported around $200/month) lowers the barrier for new criminals and accelerates the spread of smishing operations.
Commodification of Smishing AttacksFraud is packaged as a service, allowing rapid replication of attacks and consistent monetization across regions and industries.
Expanded Global Threat ImpactThis model increases attack volume and geographic reach, raising risk for consumers, enterprises, banks, and public-sector organizations.

Fraud-as-a-Service Network (Smishing Triad Overview)

The Smishing Triad’s establishment of a Fraud-as-a-Service Network, their collaboration with other cyber entities, and the provision of cybercrime-as-a-service infrastructure underscore the depth and complexity of their operations. The sale of smishing kits and the detailed pricing structure further illuminate the group’s strategic approach to expanding its reach and influence in the cybercriminal landscape. The revelations about this network serve as a stark reminder of the evolving nature of cyber threats and the imperative for continuous advancements in cybersecurity measures.

Key Statistics on the Smishing Triad

Smishing Triad Facts
Smishing Triad Facts and Figures

Here is a compilation of 20 statistics about the Smishing Triad, a China-linked cybercrime group known for large-scale SMS phishing campaigns. These are drawn from various cybersecurity reports and analyses as of early 2026.

  1. The Smishing Triad has been linked to over 194,000 malicious domains used in global phishing operations since January 1, 2024.
  2. The group has earned more than $1 billion through scams over the last three years.
  3. Approximately 195,000 domains have been traced to the Smishing Triad since January 2024.
  4. The operation involves thousands of malicious actors, including dozens of active, high-level participants.
  5. The Smishing Triad has been active since at least 2023, with criminal affiliate partners operating in multiple countries.
  6. Their campaigns have targeted at least 121 countries and numerous industries.
  7. The group sends up to 100,000 smishing texts daily.
  8. Portions of their infrastructure generated over 1,000,000 phishing page visits within a 20-day period.
  9. In January 2024, a USPS smishing campaign targeted over 180,000 U.S. residents.
  10. Approximately 25,000 phishing domains are active during any 8-day period.
  11. Smishing campaigns maintain an average success rate of approximately 5%.
  12. Some domains receive over 500 visits per week.
  13. One identified threat actor can send up to 2,000,000 smishing messages daily.
  14. The group could potentially target up to 60,000,000 victims per month or 720,000,000 per year.
  15. Around 200,000 domains have been used by the group in recent years.
  16. The crime group has amassed more than 1 million victims across 120 countries.
  17. They have stolen between 12.7 million and 115 million credit cards in the U.S. alone.
  18. Roughly 90,000 fraudulent domains impersonated toll services, and over 28,000 impersonated the US Postal Service.
  19. From January 1, 2024, to June 2025, 136,933 root domains were registered by the Smishing Triad, totaling 194,345 fully qualified domain names.

Read our guide to learn key Smishing statistics in 2026.

Challenges in Combating Smishing Triad

Addressing the challenges in combating cybercrime, particularly those posed by groups like the Smishing Triad, unveils a complex landscape marked by jurisdictional hurdles and the need for international cooperation. The transnational nature of such cyber threats necessitates a unified approach, where difficulties in disrupting activities by actors in foreign jurisdictions are addressed through regulatory harmonization and mutual legal assistance.

One of the primary challenges in combating the Smishing Triad activities stems from their origin in China. The geographical and jurisdictional boundaries present significant obstacles in pursuing and disrupting the operations of such foreign-based cyber-criminal entities. The differences in legal frameworks, enforcement mechanisms, and the availability of resources across countries can impede timely and effective responses to emerging threats.

The Smishing Triad’s ability to operate across borders, exploiting vulnerabilities and targeting victims worldwide, highlights the need for a cohesive and harmonized international approach to cybersecurity. Regulatory harmonization is pivotal in establishing common standards and protocols for addressing cybercrime, thereby facilitating cooperation and information sharing among nations. A harmonized regulatory environment can foster a more conducive atmosphere for joint efforts in investigating and combating cyber threats, regardless of their origin.

Equally important is the establishment of mutual legal assistance agreements abroad. Such agreements are instrumental in enabling cross-border collaboration and support in legal matters related to cybercrime. They provide a framework for extradition, evidence sharing, and joint investigations, thereby enhancing the capacity of nations to respond to and mitigate the impact of transnational cyber-criminal activities.

The challenges the Smishing Triad and similar entities pose underscore the urgency of addressing the gaps in international cybersecurity frameworks. The importance of overcoming jurisdictional barriers, fostering regulatory harmonization, and establishing mutual legal assistance cannot be overstated. These elements are foundational in building a resilient and united front against the ever-evolving and increasingly sophisticated landscape of cyber threats.

The journey to combatting cybercrime is fraught with challenges, but the path forward is clear. The international community must come together, transcending boundaries and differences, to forge a united and robust defense against the activities of groups like the Smishing Triad. Pursuing regulatory harmonization and mutual legal assistance abroad is a necessity and a cornerstone in safeguarding the digital realm against the multifaceted challenges of the modern cybercrime era.

How to Protect Against Smishing Triad Attacks

To reduce smishing risk, organizations should implement layered defenses:

Final Thoughts: Smishing Triad Shows Why Mobile Phishing Is the Next Major Threat

The Smishing Triad represents the industrialization of SMS phishing—global, scalable, and extremely profitable.

Organizations must move beyond awareness posters and adopt modern Human Risk Management strategies that include:

  • Smishing Simulation
  • Behavioral Microlearning
  • Real-Time Risk Analytics
  • Multi-channel phishing defense

Keepnet helps enterprises stop smishing, vishing, quishing, and AI-driven phishing attacks through the Human Risk Management Platform.

Explore Smishing Simulator Further

Are you ready to fortify your organization’s defenses against smishing attacks? We invite you to explore the capabilities of our Smishing Simulator in more detail. Request a demo or sign up for a free trial on our website to experience how our solution can empower your business to stay ahead of evolving cyber threats. Don’t miss the opportunity to safeguard your organization and build a resilient cybersecurity culture with Keepnet’s innovative solutions.

Editor's Note: This blog was updated on February 9, 2026.

SHARE ON

twitter
linkedin
facebook

Schedule your 30-minute demo now

You'll learn how to:
tickAutomate behaviour-based security awareness training for employees to identify and report threats: phishing, vishing, smishing, quishing, MFA phishing, callback phishing!
tickAutomate phishing analysis by 187x and remove threats from inboxes 48x faster.
tickUse our AI-driven human-centric platform with Autopilot and Self-driving features to efficiently manage human cyber risks.

Frequently Asked Questions

What is the Smishing Triad?

arrow down

The Smishing Triad is a China-linked cybercriminal network known for running large-scale SMS phishing (smishing) campaigns worldwide. The group impersonates trusted brands such as postal services, banks, and e-commerce platforms to steal credentials, payment data, and one-time passcodes.

How does the Smishing Triad carry out smishing attacks?

arrow down

Smishing Triad attacks typically begin with a fraudulent SMS message claiming an urgent delivery issue, unpaid fee, or security alert. Victims are directed to a fake website where attackers collect sensitive information such as login credentials, credit card details, or MFA verification codes.

Why is the Smishing Triad considered a global threat?

arrow down

The Smishing Triad is considered one of the most dangerous smishing networks because it operates at industrial scale, using thousands of rotating phishing domains and targeting victims across multiple countries. Its Fraud-as-a-Service model also enables other criminals to launch smishing campaigns using purchased toolkits.

What brands does the Smishing Triad commonly impersonate?

arrow down

The Smishing Triad frequently impersonates well-known delivery and postal services such as Royal Mail, USPS, Correos, PostNord, Poste Italiane, and other regional carriers. The group also targets financial institutions and online shopping platforms to maximize fraud opportunities.

How can organizations protect against Smishing Triad attacks?

arrow down

Organizations can reduce risk by implementing mobile-focused security awareness training, running smishing simulation exercises, deploying SMS and URL filtering solutions, and encouraging employees to report suspicious messages immediately. Smishing defense is now a key component of modern Human Risk Management strategies.

How does the Smishing Triad use iMessage in their attacks?

arrow down

The Smishing Triad utilizes compromised Apple iCloud accounts to send fraudulent iMessages. This method allows them to bypass traditional security measures and reach a wider audience, making their attacks more effective and challenging to counter.

Which postal and delivery services have been impersonated by the Smishing Triad?

arrow down

The Smishing Triad has impersonated several renowned postal and delivery services worldwide, including Royal Mail, New Zealand Postal Service, Correos, PostNord, Poste Italiane, USPS, Poczta Polska, J&T Express, and New Zealand Post, to gain the trust of potential victims.

How does the Smishing Triad target online shopping platforms?

arrow down

The Smishing Triad targets online shopping platforms by injecting malicious code into their websites. This allows them to intercept and collect customer data during transactions, gaining unauthorized access to sensitive information and facilitating identity theft and financial fraud.

What is the Fraud-as-a-Service Network operated by the Smishing Triad?

arrow down

The Smishing Triad operates a Fraud-as-a-Service Network, where they sell smishing kits in Telegram IM groups, collaborate with other cyber-criminals, and offer a variety of cybercrime-as-a-service infrastructures. This network enables the proliferation of smishing and other cybercrimes, making them more accessible and widespread.

What challenges are faced in combating the activities of the Smishing Triad?

arrow down

Combating the Smishing Triad presents challenges such as jurisdictional limitations, difficulties disrupting activities by actors in foreign jurisdictions like China, and the need for international cooperation, regulatory harmonization, and mutual legal assistance to address transnational cyber threats effectively.

Why is international cooperation important in combating Smishing Triad?

arrow down

International cooperation is crucial for addressing the challenges transnational cyber-criminal entities like the Smishing Triad pose. It enables overcoming jurisdictional barriers, fosters regulatory harmonization, facilitates mutual legal assistance, and promotes the sharing of knowledge and resources, thereby strengthening the global response to cyber threats.

Is Smishing Triad still active in 2026?

arrow down

Yes. The group continues expanding globally, using rotating phishing domains and new brand impersonation tactics.

Why is smishing harder to detect than email phishing?

arrow down

Because SMS messages feel more personal, bypass many email security filters, and reach users instantly on mobile devices.