Chinese-Backed Smishing Services Exploit OTT Messaging to Amplify Credential Theft
In recent years, a surge in sophisticated phishing campaigns has been observed, with Chinese-backed services leveraging over-the-top (OTT) messaging platforms to execute large-scale credential theft operations. These campaigns utilize platforms such as Apple iMessage and Rich Communication Services (RCS) to disseminate fraudulent messages, significantly enhancing their reach and effectiveness.
The Evolution of Phishing-as-a-Service (PhaaS)
Phishing-as-a-Service (PhaaS) has revolutionized the cybercriminal landscape by providing ready-made phishing kits that include templates, backend panels, and technical support. This model allows individuals with limited technical expertise to launch extensive credential theft campaigns. Chinese-language PhaaS platforms have rapidly become prominent in this arena, enabling operators to target victims across multiple countries simultaneously.
Researchers at urlscan.io have identified several active Chinese-language PhaaS ecosystems. Their findings, published on April 27, 2026, reveal that these services employ a combination of SMS-based smishing and OTT messaging platforms to reach potential victims. The use of legitimate messaging channels makes these attacks more challenging to detect and block, increasing the likelihood of success for each campaign.
The Scale and Impact of These Campaigns
The magnitude of these campaigns is alarming. Data from organizations such as the Anti-Phishing Working Group (APWG) and Microsoft indicate significant increases in domain registrations associated with these frameworks, alongside a rise in phishing kit deployments and overall phishing activity worldwide. Companies like Group-IB, Resecurity, and the GSM Association (GSMA) have documented the rapid expansion of these ecosystems, noting their operation on affiliate-based business models similar to those used by legitimate software companies.
The rapid growth of these platforms suggests that a substantial portion of the SMS-based credential theft activity observed globally today can be traced back to Chinese-language PhaaS operations. These services are particularly effective due to their ability to conduct cross-border campaigns without altering their core infrastructure. A single backend platform can support numerous phishing page templates designed to mimic banks, postal services, toll payment systems, and government agencies in various countries simultaneously. This capability allows operators to target victims in the United States, the United Kingdom, Australia, and Japan within the same campaign window.
Utilization of SIM Box Infrastructure
A critical component of these campaigns is the use of SIM box infrastructure to send fraudulent messages at high volumes. A SIM box is a device that holds multiple physical SIM cards and connects to the internet, enabling it to send large numbers of SMS messages that appear to originate from regular mobile numbers rather than commercial bulk-sending platforms. This setup increases the likelihood of messages bypassing spam filters and carrier-level detection systems, thereby enhancing the effectiveness of the campaigns.
The Role of OTT Messaging Platforms
In addition to traditional SMS, these campaigns exploit OTT messaging platforms like Apple iMessage and RCS. By utilizing these platforms, attackers can send messages that appear more legitimate and are less likely to be flagged as spam. This approach not only broadens the reach of the campaigns but also increases their success rates, as recipients are more inclined to trust messages received through these channels.
Case Study: The Panda Shop Smishing Kit
A notable example of these sophisticated smishing campaigns is the Panda Shop smishing kit. This kit enables cybercriminals to steal financial data, including Google Pay, Apple Pay, and credit card details. It employs advanced social engineering tactics by impersonating trusted organizations like USPS, DHL, and major banking institutions, creating convincing phishing pages that are nearly indistinguishable from authentic sites on mobile devices. The kit represents a significant evolution in smishing technology, with templates customized for popular mobile platforms and browsers. When victims open such pages, they believe they are visiting legitimate websites that sent mobile notifications requesting additional information to receive a parcel or verify account details. Resecurity researchers identified the kit on March 22, 2025, noting that the actors behind it can send up to 2 million smishing messages daily. This massive scale enables Chinese cybercriminals to potentially target up to 60 million victims monthly—enough to reach every person in the United States twice per year. The Panda Shop operation appears to be connected to or possibly a rebranding of the previously identified Smishing Triad group. Resecurity analysts observed that the kit’s structure and scripting scenarios closely resemble those used by the Smishing Triad, though with specific improvements and newly supported templates. The actors explicitly state they have no fear of FBI and consider themselves untouchable due to their location in China.
Technical Operation and Evasion Methods
What sets Panda Shop apart is its sophisticated use of modern messaging platforms. Rather than relying solely on traditional SMS, the kit primarily utilizes Google RCS and Apple iMessage for delivery. This approach allows attackers to bypass traditional SMS filtering mechanisms and reach a broader audience. The use of these platforms also enables the inclusion of rich media content, making the phishing messages more engaging and convincing.
The Growing Threat Landscape
The rapid expansion of Chinese-backed smishing services underscores the evolving nature of cyber threats. The combination of PhaaS platforms, SIM box infrastructure, and OTT messaging channels has created a potent toolset for cybercriminals. As these services continue to grow and adapt, it is imperative for individuals and organizations to remain vigilant. Implementing robust security measures, educating users about the risks of smishing, and staying informed about emerging threats are crucial steps in mitigating the impact of these campaigns.
Conclusion
The exploitation of OTT messaging platforms by Chinese-backed smishing services represents a significant escalation in credential theft operations. The sophistication and scale of these campaigns highlight the need for enhanced security measures and increased awareness to protect against this growing threat.