Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

    October 13, 2025

    Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs

    October 13, 2025

    See It Here First at TechCrunch Disrupt 2025

    October 13, 2025
    Facebook X (Twitter) Instagram
    Trending
    • WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
    • Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs
    • See It Here First at TechCrunch Disrupt 2025
    • Final Flash Sale: Save up to $624 on Disrupt 2025 Passes
    • I tested a Windows laptop with a tandem OLED, and it’s spoiled working on other displays for me
    • Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
    • German state replaces Microsoft Exchange and Outlook with open-source email
    • Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Guides»Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall
    Guides

    Criminals built a secret Telegram network to steal 115 million cards without breaching a single bank firewall

    TechurzBy TechurzAugust 10, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Mobile Security
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Phishing attacks now bypass multi-factor authentication using real-time digital wallet provisioning tactics
    • One-time passcodes are no longer enough to stop fraudsters with mobile-optimized phishing kits
    • Millions of victims were targeted using everyday alerts like tolls, packages, and account notices

    A wave of advanced phishing campaigns, traced to Chinese-speaking cybercriminal syndicates, may have compromised up to 115 million US payment cards in just over a year, experts have warned.

    Researchers at SecAlliance revealed these operations represent a growing convergence of social engineering, real-time authentication bypasses, and phishing infrastructure designed to scale.

    Investigators have identified a figure referred to as “Lao Wang” as the original creator of a now widely adopted platform that facilitates mobile-based credential harvesting.


    You may like

    Identity theft scaled through mobile compromise

    At the center of the campaigns are phishing kits distributed through a Telegram channel known as “dy-tongbu,” which has rapidly gained traction among attackers.

    These kits are designed to avoid detection by researchers and platforms alike, using geofencing, IP blocks, and mobile-device targeting.

    This level of technical control allows phishing pages to reach intended targets while actively excluding traffic that might flag the operation.

    The phishing attacks typically begin with SMS, iMessage, or RCS messages using everyday scenarios, such as toll payment alerts or package delivery updates, to drive victims toward fake verification pages.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    There, users are prompted to enter sensitive personal information, followed by payment card data.

    The sites are often mobile-optimized to align with the devices that will receive one-time password (OTP) codes, allowing for immediate multi-factor authentication bypass.

    These credentials are provisioned into digital wallets on devices controlled by attackers, allowing them to bypass additional verification steps normally required for card-not-present transactions.

    Researchers described this shift to digital wallet abuse as a “fundamental” change in card fraud methodology.

    It enables unauthorized use at physical terminals, online shops, and even ATMs without requiring the physical card.

    Researchers have observed criminal networks now moving beyond smishing campaigns.

    There is growing evidence of fake ecommerce sites and even fake brokerage platforms being used to collect credentials from unsuspecting users engaged in real transactions.

    The operation has grown to include monetization layers, including pre-loaded devices, fake merchant accounts, and paid ad placements on platforms like Google and Meta.

    As card issuers and banks look for ways to defend against these evolving threats, standard security suites, firewall protection, and SMS filters may offer limited help given the precision targeting involved.

    Given the covert nature of these smishing campaigns, there is no single public database listing affected cards. However, individuals can take the following steps to assess possible exposure:

    • Review recent transactions
    • Look for unexpected digital wallet activity
    • Monitor for verification or OTP requests you didn’t initiate
    • Check if your data appears in breach notification services
    • Enable transaction alerts

    Unfortunately, millions of users may remain unaware their data has been exploited for large-scale identity theft and financial fraud, facilitated not through traditional breaches.

    Via Infosecurity

    You might also like

    bank breaching built Cards criminals Firewall Million network secret single steal Telegram
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBest essential tech kit for college student room
    Next Article Here Are GPT-5 Prompt Engineering Insights Including Crucial AI Prompting Tips And Techniques
    Techurz
    • Website

    Related Posts

    Security

    I compared 5G network signals of Verizon, T-Mobile, and AT&T at a baseball stadium – here’s the winner

    October 11, 2025
    Security

    Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

    October 10, 2025
    Security

    Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

    October 10, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

    October 13, 2025

    Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs

    October 13, 2025

    See It Here First at TechCrunch Disrupt 2025

    October 13, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.