Phishing Bypasses MFA via Digital Wallet Provisioning

Phishing gangs are now defeating multi-factor authentication by provisioning payment credentials into digital wallets in real time. One-time passcodes alone no longer stop attackers who use phishing kits tuned for mobile devices.

Using everyday-looking messages — about tolls, deliveries, or account alerts — these campaigns have reached millions of potential victims. Security researchers at SecAlliance warn that a sophisticated wave of phishing activity, linked to Chinese-language criminal groups, may have exposed as many as 115 million U.S. payment cards over a little more than a year.

According to the investigators, this trend represents a fusion of social-engineering tactics, live authentication bypasses, and scalable phishing infrastructure. They trace the origin of a widely used mobile credential-harvesting platform to an individual nicknamed “Lao Wang.”

Mobile takeover drives identity theft at scale

Central to these operations are phishing kits spread through a Telegram channel called “dy-tongbu,” which has become popular among threat actors. The kits are engineered to evade analysis and platform scrutiny by employing geofencing, IP filtering, and strict targeting of mobile devices.

Those controls let scammers show their malicious pages only to intended targets while blocking traffic that might reveal the scheme. Attacks usually start with SMS, iMessage, or RCS messages that mimic routine notifications — toll invoices, shipping updates, or account verifications — steering recipients to bogus verification pages.

Victims are asked for personal details and payment card information. Because the fake sites are optimized for mobile, they capture the one-time codes sent to the device and immediately use them to bypass multi-factor checks.

Stolen card credentials are then provisioned into digital wallets on devices the criminals control, sidestepping extra fraud checks that normally protect card-not-present payments. Researchers call this move to abusing digital wallets a “fundamental” shift in how card fraud is carried out.

That change makes it possible for stolen payment methods to be used online, at point-of-sale terminals, and even at ATMs — all without the physical card.

Beyond smishing: deeper fraud ecosystems

The criminals aren’t limiting themselves to text-based scams. There’s growing evidence they’ve set up fake online stores and sham brokerage sites to harvest credentials from people making legitimate transactions. The overall operation now includes monetization tactics such as selling pre-loaded devices, fabricating merchant accounts, and buying ad placements on platforms like Google and Meta.

Because these smishing efforts are so precisely targeted and clandestine, traditional defenses — standard security suites, firewalls, and SMS filters — may only offer limited protection. There isn’t a public list of affected cards, but people can check their risk by taking a few steps:

• Review recent card and account transactions for anything unusual.
• Watch for unexpected changes or adds in your digital wallets.
• Be alert for verification prompts or OTPs you didn’t request.
• See whether your information shows up in breach-notification services.
• Turn on transaction alerts from your bank or card issuer.

Sadly, many victims likely don’t know their data has been repurposed for large-scale identity theft and financial fraud — theft that often happens without a conventional data breach.

(Reported via Infosecurity)

More From NewForTech

Booking.com Scam Alert: Fake Emails Use Japanese Letters

Hey, listen up if you're into renting out places on Booking.com or just booking trips—you might want to watch out for this sneaky trick...

Endgame Gear Hit by Supply Chain Attack: Malware in Mouse Tool

Peripheral device manufacturer Endgame Gear has acknowledged falling victim to a supply chain compromise where unknown cybercriminals infiltrated their web platform and substituted an...

Ransomware Response: What to Do in the First 24 Hours

A ransomware attack is one of the most serious threats an organization can face.It’s disruptive, expensive, and can severely damage your reputation. Your response...

Safari Fullscreen Feature Exploited in New Browser-Based Phishing Attacks

Security researchers have discovered a new phishing technique that exploits a Safari browser feature to steal user credentials. The attack uses the Fullscreen API...

94 Billion Stolen Cookies Found on the Dark Web, NordVPN Reports

New research from NordVPN has uncovered a massive trove of stolen browser cookies circulating on the dark web. The report estimates that around 94 billion...

AI Governance: Balancing Innovation and ESG Goals

The race to lead in artificial intelligence is accelerating. Major tech companies are pouring billions into boosting computing power and infrastructure. From headline-grabbing supercomputers to...