Skip to content
  Sunday 9 November 2025
Trending
January 1, 20228 Best YouTube Video Downloaders for Android (2022 Apps APK) February 23, 2024Microsoft introduces PyRIT – A newly launched Red Teaming Tool designed for Generative AI March 1, 2024The Entra ID Single Sign On Security is Haunted by Silver SAML January 23, 2024VexTrio: The Cybercrime Equivalent of Uber October 13, 2023Revised: Women Political Leaders at Risk as PEAPOD Cyberattack Campaign Emerges March 27, 2024Zero-Day Vulnerabilities Being Actively Exploited August 5, 2025<h3>Is IT-OT Integration Essential for Success?</h3> January 1, 2022Windows 10 Official ISO 32-Bit/64-Bit Full Version Free Download 2022 April 18, 2025Chinese Smishing Kit Fuels Nationwide Toll Fraud Scheme in 8 U.S. States<br /> <br /> A sophisticated smishing kit developed by Chinese hackers has been identified as the driving force behind a widespread toll fraud campaign targeting users in 8 states across the United States. Smishing, a form of phishing that utilizes SMS messages to deceive recipients into divulging personal information or downloading malicious software, has been increasingly used by cybercriminals to carry out fraudulent activities.<br /> <br /> This particular campaign, which has affected users in states such as California, Texas, and New York, aims to deceive individuals into unknowingly racking up exorbitant toll charges by clicking on fraudulent links sent via text messages. The Chinese smishing kit allows hackers to easily create convincing messages that appear to be from legitimate sources, making it easier to trick unsuspecting users into falling for their schemes.<br /> <br /> The toll fraud scheme not only poses a financial threat to affected individuals but also raises concerns about the security of personal information. By clicking on these malicious links, users risk exposing sensitive data that can be used for identity theft or other nefarious purposes. The widespread nature of this campaign underscores the importance of staying vigilant against cyber threats and taking precautions to protect one’s personal information.<br /> <br /> Law enforcement agencies and cybersecurity experts are working diligently to track down the perpetrators behind this toll fraud campaign and prevent further damage to users. In the meantime, it is crucial for individuals to be cautious when receiving unsolicited messages and to refrain from clicking on any suspicious links. By remaining vigilant and informed about the latest cybersecurity threats, users can better protect themselves from falling victim to scams like these.<br /> <br /> As technology continues to evolve, so too do the tactics used by cybercriminals to exploit vulnerabilities and carry out fraudulent activities. The Chinese smishing kit powering this toll fraud campaign serves as a stark reminder of the importance of cybersecurity awareness and the need for proactive measures to safeguard personal information in an increasingly digital world. April 15, 2024Expert Cybersecurity Analyst
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  

Ransomware’s Next Target: IoT Devices Under Siege?

Industry News

Ransomware’s Next Target: IoT Devices Under Siege?

SecuredyouadmSecuredyouadm—May 5, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Dreaming Unleashes the Power of Generative AI

October 9, 2023

Speed Up Your Security: 4 Quick Decision-Making Strategies

February 13, 2025

Apple Releases Urgent Updates to Address Zero-Day Vulnerabilities Being Exploited

March 6, 2024

Ami Daniel of Windward: Gaining Insights from Israel

November 17, 2023



In the evolving landscape of cybersecurity, the fortification of endpoints and the deployment of sophisticated detection systems have inadvertently driven cybercriminals to shift their focus toward Internet of Things (IoT) devices. This transition marks a significant change in attack strategies, as connected devices become increasingly attractive targets for threat actors aiming to penetrate corporate networks. Phillip Wylie, xIoT security evangelist at Phosphorous Cybersecurity, highlights this emerging threat, illustrating how cybercriminals like the Akira ransomware gang are adapting by exploiting IoT vulnerabilities after being thwarted by robust endpoint defenses.

Wylie recounts how the Akira group, unable to breach endpoint security, resorted to deploying malware on a network-connected camera. This allowed them to access the network via an SMB share, a strategy security teams had not anticipated. This scenario underscores the irony of organizations’ overconfidence in their hardware, as IoT devices often remain unsecured due to neglected security measures like credential rotation and timely vulnerability patching, which are standard for traditional IT infrastructure.

During an interview with the Information Security Media Group at the RSAC Conference 2025, Wylie elaborated on several critical areas of concern. He addressed the risks posed by shadow IT practices that compromise air-gapped protections for operational technology (OT) systems. Wylie also emphasized the importance of basic password hygiene for connected devices, a simple yet often overlooked security measure, and stressed the crucial role of maintaining an accurate asset inventory in bolstering IoT security programs.

Wylie’s extensive background, with over 27 years in IT and cybersecurity, lends authority to his insights. As a former adjunct instructor at Dallas College and the founder of initiatives like The Pwn School Project and Defcon Group 940, his experience spans various cybersecurity domains, including network security, application security, and penetration testing. His expertise provides valuable perspectives on the shifting dynamics of cybersecurity threats and the proactive measures necessary to counteract them.

The conversation with Wylie serves as a reminder of the evolving nature of cyber threats and the need for organizations to continually reassess and update their security strategies. As IoT devices proliferate, they represent both an opportunity and a vulnerability, necessitating vigilant security practices and a comprehensive understanding of the network landscape to protect against these emerging attack vectors.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Senior Cybersecurity WAF Engineer

Regional Alliances Strengthen in Cybercrime Battle

Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures