Palo Alto Networks' Unit 42 research team has brought to light two disparate but significant cybercrime campaigns, showcasing the diverse portfolio of modern threat actors. On October 23, 2025, the team detailed "The Smishing Deluge," a large-scale SMS phishing (smishing) operation with origins in China, which is sending waves of malicious texts to a global victim base. A day prior, Unit 42 exposed "Jingle Thief," a more niche but sophisticated fraud campaign that leverages cloud infrastructure to automate the theft and exploitation of gift card balances. These campaigns demonstrate a threat landscape characterized by both high-volume, low-sophistication social engineering and targeted, automated financial fraud, requiring a multi-faceted defensive approach.
This week's research from Unit 42 provides a snapshot of two parallel tracks in the cybercrime economy.
This campaign relies on classic social engineering tactics, amplified by the scale of mobile messaging.
T1566.002 - Spearphishing Link).T1539 - Steal Web Session Cookie or T1111 - Two-Factor Authentication Interception).This campaign is more technical and automated.
T1589.002 - Email Addresses).T1110.003 - Password Spraying).T1213 - Data from Information Repositories).M1017 - User Training).M1032 - Multi-factor Authentication).M1021 - Restrict Web-Based Content).Jingle Thief campaign evolves, now infiltrating Microsoft 365 environments, registering rogue MFA applications for persistence, and issuing unauthorized gift cards.
The primary defense against social engineering attacks like smishing is a well-trained and skeptical user base.
MFA is the most effective control against credential stuffing attacks, as a stolen password alone is not enough to gain access.
Mapped D3FEND Techniques:
Use DNS filtering and web proxies to block access to known phishing sites and malicious domains.
To counter 'The Smishing Deluge,' organizations should implement advanced URL Analysis at the network edge and on mobile devices. This goes beyond simple blocklists. Modern secure web gateways and DNS filtering services can analyze URLs in real-time as a user clicks them. They check for characteristics common in phishing, such as the use of URL shorteners, newly registered domains, Punycode to impersonate brands (e.g., xn--pple-43d.com for apple.com), and suspicious URL paths. By implementing this on corporate networks and via agents on corporate mobile devices, an organization can prevent users from ever reaching the malicious landing page, even if the smishing message itself reaches them. This effectively neutralizes the primary attack vector of the campaign.
To defeat automated fraud like 'Jingle Thief,' retailers and online services must implement Authentication Event Thresholding. This involves setting rules to detect and block the high-volume patterns of credential stuffing. For example, a WAF or anti-bot service should be configured to temporarily block an IP address that generates more than 5 failed login attempts across multiple accounts within one minute. More advanced logic can detect a distributed attack by correlating login failures across many IPs. Additionally, rules should be set to trigger CAPTCHA challenges or require MFA after a single failed login for an account, which disrupts automated scripts. This defensive technique directly targets the methodology of the 'Jingle Thief' campaign, making it economically unfeasible for attackers to continue their automated assault.
Unit 42 exposes the 'Jingle Thief' cloud-based gift card fraud campaign.
Unit 42 publishes details on 'The Smishing Deluge,' a massive smishing campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats