Open Nav
Sign Up

Under the hood of a Smishing campaign

Under the hood of a smishing campaign

Dan Shallom

May 7, 2022

Earlier today our OP Innovate research team received yet another Smishing attempt asking them to provide credit card details. 

The SMS looks like a legitimate message from the Israeli post offices and even contains a correctly formatted tracking number:

החבילה שלך: RU0041902037Z‌ מוכן לאיסוף, אנא לחץ על הקישור והשלם את התשלום: https://2u.pw/MT5To

The message requests credit card details in order to pay customs fees associated with a package and enable its delivery – this plays on the victim’s sense of urgency.

The Tiny URL service is legitimate and has been seen in previous phishing campaigns targeting Israelis.

When a victim clicks on the Tiny URL link they are redirected to the following website: https://cobbjones.ca/postal/log/app/

By navigating to the top level of the website, we arrive at the commercial and seemingly legitimate website of a Canadian law firm. The site must have been hacked in order to gain access to the sub folders – we approached the owner and informed them about the unfortunate hijacking of their web resources.

Hacked website

In terms of security, the site suffers from additional misconfigurations. These provide access to server logs and from there we could see the amount of traffic this site received, and of course the clear text credit card details that the victims inserted.

Here are some further insights:

This is how it looks like from an attacker perspective:

  1. The user form:
  2. The visitors logs
  3. The detailed visitors logs – post processing

Here are some of our insights into the attack:

  1. 06-May-2022 10:43:15 first hit – this is most probably the attacker testing their tools
  2. 07-May-2022 10:40:22 last hit; – this is most probably the tiny URL provider responded
  3. The number of SMS sent / received is unknown
  4. 4103 victims who received the SMS opened it, clicked the link and got to the phishing website
  5. 257 victims of them moved forward and provided credit card data:
    1. 164 were legitimate details
      1. 119 Visa card
      2. 45 Mastercard 
  6. As can seen from the chart below, the campaign was most successful during its first 5 hours:

We took the following action with this information:

  1. Reported the attack to the Israeli CERT 
  2. Reported the attack to the Israeli credit cards companies so that they can approach the victims 
  3. Approached the Tiny URL provider who killed the campaign 
  4. Approached the hacked website owner with some recommendations for patching and recovery
  5. Posted this blog and spread the word – if you happen to clicked and provided your card details contact your credit card provider immediately

Have a safe weekend! 

OP Innovate

Resources highlights

CVE-2025-33073: Windows SMB Client Improper Access Control Added to CISA’s KEV

CVE-2025-33073 is a high-severity vulnerability in the Windows SMB client that enables an authenticated remote attacker to escalate privileges to NT AUTHORITY\SYSTEM by abusing a…

Read more >

CVE-2025-33073

F5 Breach: Source Code & Vulnerabilities Stolen by Nation-State Actor

In August 2025, U.S. cybersecurity vendor F5 Networks uncovered a long-term intrusion by a nation-state-linked threat actor that compromised its BIG-IP product development and engineering…

Read more >

f5 breach

CVE-2025-41244: Chinese Threat Actors Actively Exploiting VMware Tools & Aria Vulnerability

CVE-2025-41244 (CVSS 7.8) is a local privilege escalation vulnerability in VMware Tools and VMware Aria Operations when the Service Discovery Management Pack (SDMP) is enabled.…

Read more >

CVE-2025-41244

CVE-2025-32463: Critical Sudo Privilege Escalation

CVE-2025-32463 is a critical local privilege escalation in the ubiquitous sudo utility. The bug allows a local user to escalate to root by abusing sudo’s…

Read more >

CVE-2025-32463

Cisco IOS and IOS XE SNMP Zero-Day Actively Exploited (CVE-2025-20352)

Cisco disclosed CVE-2025-20352, a stack overflow in the SNMP subsystem of IOS and IOS XE, now confirmed as actively exploited in the wild. Attackers can…

Read more >

CVE-2025-20352

SolarWinds Web Help Desk (WHD) Unauthenticated RCE Patch-Bypass (CVE-2025-26399)

SolarWinds released Web Help Desk 12.8.7 Hotfix 1 to fix CVE-2025-26399, an unauthenticated remote code execution flaw in the AjaxProxy component caused by unsafe deserialization.…

Read more >

CVE-2025-26399
Under Cyber Attack?

Fill out the form and we will contact you immediately.