CampaignSMS

SMS Pools and what the US Secret Service Really Found Around New York – Security Boulevard

The Home of the Security Bloggers Network
Home » Security Bloggers Network » SMS Pools and what the US Secret Service Really Found Around New York
 Last week the United Nations General Assembly kicked off in New York City.  On the first day, a strange US Secret Service press conference revealed that they had seized 300 SIM Servers with 100,000 SIM cards. Various media outlets jumped on the idea that this was some state-sponsored sleeper cell waiting to destroy telecommunication services around New York.  Like me, you may have immediately wondered why some of the photos showed sophisticated racks of servers on shelves while others showed a hodge podge of devices strewn about the bare floor of an otherwise empty apartment. 

photos extracted from USSS reporting

SIM Pools on Telegram 

Beginning in late 2024, every cell phone in the USA started getting hit hard with annoying messages claiming to be informing us of undelivered packages. In early 2025, this morphed into the famous “Toll Road” phishing messages which started off with messages supposedly about unpaid tolls in Massachusetts Easy Pass and now imitate every toll road system in America. Because the goals of these SMishing messages were to load credit cards onto phones and use them to steal money, DarkTower spent quite a bit of time studying the infrastructure, which is primarily advertised and sold in Telegram channels that we call “Chinese Guarantee Syndicates.” I’ve conducted several briefings about these systems, and have mentioned previously in this blog how they sell SMS-blasting telecom equipment (See: Chinese SMS Spammers Go Mobile ).
The devices found around the NYC tri-state area are a slightly different application of SMS-blasting.
The most famous of the Chinese Guarantee Syndicates, Haowang Guarantee, is part of the US-sanctioned Huione Pay, “The Largest Illicit Online Marketplace” according to Elliptic and WIRED. Haowang has shifted their business to Tudou Danbao, but their vendors continue to offer SMS Modem Pools and associated hardware and software as part of their Crime-as-a-Service empire.  Here’s an ad for one such vendor (with its translation):

SMS Modem Pools have a variety of configurations.  The most basic has 8 modem ports with slots for one SIM card each. On the opposite end of the scale, is a 64 port modem with capacity for 512 SIM cards. (Many of those found by the USSS seem to be 32-port modems with 256 SIM cards.) When there are more SIM cards than modem ports message sending rotates between SIM cards. 
The concept, as Annie explains, is that you can route messages from anywhere in the world and have them sent from an SMS pool sitting in the United States and being sent from a US-based SIM, thus having a US telephone number displayed in the caller id.
An English-speaking Bulk SMS provider, KathyBulkSMS, also is quite blatant about the criminal nature of the messages she suggests.  Her service also has the ability to send using “Short Message Code” caller IDs. She particularly recommends imitating Coinbase if spamming in the US and says that her recent campaign, sending 170,000 such messages via Verizon, AT&T, and T-Mobile, was “very effective.”
Kathy gives other examples, such as imitating Binance and National Australia Bank for the Australian market, but her channel has suggestions for many countries, including Netflix and Crypto campaigns for:  ðŸ‡¬ðŸ‡·Greece 🇵🇹Portugal 🇦🇹Austria 🇮🇪Ireland 🇯🇵Japan 🇸🇰Slovakia 🇰🇷South Korea and 🇪🇸Spain.
 
But what about the SIM cards? Don’t worry, there are many Facebook groups, and many more Telegram channels that will hook you up. The Telegram user @Zoom557 posts to many Facebook groups using the new criminal-friendly “Anonymous Poster” service. On Telegram he is excited about the new $5 SIM cards offered 
BaronLiu also uses Facebook to push his Telegram SIM card offerings. 
Here are a few of the Facebook groups (all in Chinese) that specialize in SIM card selling. Notice the sizes: 2500 members, 3600 members, 6400 members, and 8700 members. Most of these groups also offer mass account creation and social media spamming services. 
The same vendor shared the photo below.  This isn’t USSS in New York.  This is a deployment in Thailand using a SIM pool to provide Thai-WhatsApp numbers to customers around the world. 

Darcula was well-and-truly doxed by the excellent researchers at Mnemonic.io — Erlend Leiknes and Harrison Sand.  I’ve spoken to them both and they did a great job tearing apart Darcula’s code and mapping out the credit card theft associated with it!  

A “Cat Card” is a SIM card.  This is the term to search on Chinese Telegram to find people selling SIM cards and related services. 
*** This is a Security Bloggers Network syndicated blog from CyberCrime & Doing Time authored by Gary Warner. Read the original post at: https://garwarner.blogspot.com/2025/09/sms-pools-and-what-us-secret-service.html
Security Boulevard Logo White
DMCA
Executive Security as a Strategic Priority

Step 1 of 8

source

Leave a Reply

Your email address will not be published. Required fields are marked *