Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Home/Threats/Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
Threats

Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives

Phoenix, a potent new Phishing-as-a-Service (PhaaS) platform, is quietly expanding its global footprint, fueling a concerning rise in brand impersonation smishing. Attackers are leveraging this...

Jennifer sherman
Jennifer sherman
April 30, 2026 4 Min Read
0 0

Phoenix, a potent new Phishing-as-a-Service (PhaaS) platform, is quietly expanding its global footprint, fueling a concerning rise in brand impersonation smishing. Attackers are leveraging this platform to deploy fake SMS messages, meticulously crafted to mimic legitimate communications from trusted entities across the finance, telecom, and logistics sectors. Its operations and impact are detailed in a

This platform works on a subscription basis, making it easy for cybercriminals with limited technical skills to launch large-scale smishing campaigns in minutes.

Phishing-as-a-Service, or PhaaS, has become one of the fastest-growing threats in the cybercrime world. Instead of building tools from scratch, cybercriminals now rent ready-made phishing kits that come with pre-built templates, real-time dashboards, and automated victim tracking.

The Phoenix System builds on this model by offering a centralized administrative panel that lets operators manage multiple phishing campaigns at once across different countries and industries.

Victimology map for the Reward Points Phishing campaign (Source - Group-IB)
Victimology map for the Reward Points Phishing campaign (Source – Group-IB)

Since January 2024, the platform has been linked to two primary campaign types: Reward Points Phishing, which impersonates banks and mobile operators, and Failed Parcel Delivery Phishing, which impersonates logistics and shipping companies. 

Victimology map for the Failed Parcel Delivery Phishing campaign (Source - Group-IB)
Victimology map for the Failed Parcel Delivery Phishing campaign (Source – Group-IB)

Group-IB researchers uncovered the Phoenix System while analyzing global smishing operations spanning APAC, LATAM, Europe, and MEA regions.

The investigation revealed that despite targeting different industries and victim groups, both campaign types share the same backend infrastructure, confirming they are not separate operations but part of a single, organized phishing ecosystem.

The platform is the direct successor to an earlier tool known as the Mouse System, which has since been decommissioned.

The Phoenix System inherits much of the same JavaScript logic and administrative framework from its predecessor, with significant updates that make it harder to detect and easier to operate at scale.

So far, the campaigns driven by Phoenix have targeted more than 70 organizations worldwide, with over 1,500 phishing domains identified since the beginning of 2024.

What makes Phoenix particularly alarming is its combination of speed, flexibility, and evasion capabilities. Operators can configure campaigns for specific countries using geofencing and IP filtering controls, ensuring that only victims from the intended region ever see the phishing content.

A Telegram channel selling the Phoenix System phishing kits (Source - Group-IB)
A Telegram channel selling the Phoenix System phishing kits (Source – Group-IB)

The platform charges around $2,000 for annual access and is distributed through dedicated Telegram channels.

Inside the Phoenix Phishing Panel

One of the most technically notable aspects of Phoenix is its centralized administrative panel, which gives operators full control over every stage of a phishing campaign.

Once configured, the panel allows operators to oversee active campaigns, set traffic filtering rules by IP range or device type, and monitor all harvested credentials in real time through a live dashboard. 

The smishing messages are delivered using a combination of ordinary mobile numbers and Base Transceiver Station injection.

How the Base Transceiver Station (BTS) works (Source - Group-IB)
How the Base Transceiver Station (BTS) works (Source – Group-IB)

BTS-based delivery involves rogue equipment that broadcasts stronger signals than legitimate towers, forcing nearby devices to connect and receive injected SMS messages directly.

Since these messages bypass carrier-level filtering, they appear to arrive from legitimate sender names and branded short codes, making them much harder for both users and telecom operators to detect.

When a victim clicks the link inside the SMS, the phishing page first checks the visitor’s IP address and device type.

Only users from the targeted country and on approved devices can see the fraudulent page.

Everyone else is silently redirected to an error page or a default system redirect, effectively hiding the infrastructure from security researchers.

The phishing pages are crafted to closely mimic official websites of well-known brands with matching logos, layouts, and wording.

Victims are first prompted to enter their phone number to check reward status or update delivery details.

After submission, they are taken through a series of pages that collect full credit card details, shipping addresses, and personally identifiable information.

Organizations can reduce their exposure by continuously monitoring for SMS-linked brand abuse and tracking newly registered domains.

Telecom teams should enable rapid takedown workflows and coordinate with carriers when BTS-based injection is suspected.

Individual users should avoid clicking links inside unsolicited SMS messages, verify any alerts through official apps or websites, and never enter payment or personal details through links received by text.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

phishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Targeted Large-Scale Campaign Attacking U.S. Organizations with

Next Post

Qilin Ransomware Lists RDP Auth History on Enumerates Authentication

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
WordPress Plugin Hacked Since 2020 to Inject Malicious
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us