CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 29, 2026

Canada arrests three for operating “SMS blaster” device in Toronto

Bleeping Computer Archived Apr 29, 2026 ✓ Full text saved

Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts to nearby phones. [...]

Full text archived locally
✦ AI Summary · Claude Sonnet


    Canada arrests three for operating “SMS blaster” device in Toronto By Bill Toulas April 27, 2026 04:00 PM 0 Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts to nearby phones. Such tools trick devices into connecting to them by emitting signals that mimic a legitimate tower. Mobile phones in its range automatically link to them as there is stronger reception. Once the connection is established, the operators of these rogue cellular base stations can push SMS messages directly to connected devices, which appear to come from trusted entities such as banks or the government. “An SMS blaster works by mimicking a legitimate cellular tower. When nearby phones connect to it, users receive fraudulent text messages that appear to come from trusted organizations,” explains the police. “These messages often prompt recipients to click on links that lead to fake websites designed to capture personal information, including banking credentials and passwords.” No phone numbers are required for these messages to be sent; only that the targets be within range. In densely populated areas, this practically means mass distribution, and hence the name “blaster.” The Canadian authorities noted that this is the first time that such a device has been spotted in the country. The Toronto Police said the investigation, dubbed ‘Project Lighthouse,’ began in November 2025 after receiving tips about suspicious activity in downtown Toronto. Police found that the equipment was operated from vehicles, allowing it to move across the Greater Toronto Area and target large numbers of people. The investigators believe that during the SMS blaster’s operation, 13 million cases of mobile network entrapment occurred. Besides the phishing aspect, devices connected to those rogue stations are temporarily disconnected from their provider's legitimate network and cannot reach emergency services if needed. The police conducted searches in Markham and Hamilton on March 31, and seized multiple SMS blasters and other electronic devices. Two suspects were arrested, while a third man turned himself in on April 21. To defend against rogue towers, users are recommended to disable 2G downgrades on Android, although this measure is not effective against more advanced setups targeting LTE/5G signaling. SMS should be treated as an insecure channel, and users should avoid following links received over this channel. For sensitive data or communication exchanges, the recommendation is to use end-to-end encrypted channels. 99% of What Mythos Found Is Still Unpatched. AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming. At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop. Claim Your Spot Related Articles: Interpol operation Synergia takes down 1,300 servers used for cybercrime Suspect behind Snowflake data-theft attacks arrested in Canada Robinhood account creation flaw abused to send phishing emails New BlackFile extortion group linked to surge of vishing attacks Spain dismantles major $4.7M manga piracy platform, arrests four
    💬 Team Notes
    Article Info
    Source
    Bleeping Computer
    Category
    ◇ Industry News & Leadership
    Published
    Apr 29, 2026
    Archived
    Apr 29, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗