Palo Alto Networks' Unit 42 Details Global Smishing Campaign and Cloud-Based Gift Card Fraud

Unit 42 Exposes 'Smishing Deluge' from China and 'Jingle Thief' Gift Card Fraud

MEDIUM
October 23, 2025
October 24, 2025
5m read
PhishingThreat IntelligenceCloud Security

Related Entities(initial)

Other

The Smishing DelugeJingle Thief

Full Report(when first published)

Executive Summary

Palo Alto Networks' Unit 42 research team has brought to light two disparate but significant cybercrime campaigns, showcasing the diverse portfolio of modern threat actors. On October 23, 2025, the team detailed "The Smishing Deluge," a large-scale SMS phishing (smishing) operation with origins in China, which is sending waves of malicious texts to a global victim base. A day prior, Unit 42 exposed "Jingle Thief," a more niche but sophisticated fraud campaign that leverages cloud infrastructure to automate the theft and exploitation of gift card balances. These campaigns demonstrate a threat landscape characterized by both high-volume, low-sophistication social engineering and targeted, automated financial fraud, requiring a multi-faceted defensive approach.


Threat Overview

This week's research from Unit 42 provides a snapshot of two parallel tracks in the cybercrime economy.

Campaign 1: The Smishing Deluge

  • Threat: A massive, ongoing smishing campaign.
  • Attribution: Linked to a threat actor based in China.
  • Vector: Malicious SMS text messages sent to a global audience.
  • Objective: The primary goal is social engineering. The messages trick recipients into clicking malicious links, which can lead to credential harvesting websites, malware downloads, or other forms of fraud.
  • Scale: Described as a "deluge," indicating a very high volume of messages being sent to maximize the number of potential victims.

Campaign 2: Jingle Thief

  • Threat: An automated gift card fraud campaign.
  • Vector: A sophisticated operation leveraging cloud infrastructure.
  • Objective: The direct theft and monetization of funds stored on gift cards. This likely involves techniques like credential stuffing attacks on retail websites to take over accounts with stored gift cards, or brute-forcing gift card numbers and PINs.
  • Infrastructure: The use of cloud services allows the attackers to scale their operation, using vast pools of IP addresses to bypass rate limiting and anti-bot protections.

Technical Analysis

The Smishing Deluge TTPs

This campaign relies on classic social engineering tactics, amplified by the scale of mobile messaging.

  • Initial Access: The attack begins with an SMS message containing a fraudulent premise (e.g., a fake package delivery notification, a bank alert, a prize winning) and a URL-shortened link (T1566.002 - Spearphishing Link).
  • Execution: The user clicks the link, which directs them to a malicious website controlled by the attacker. This site is often a pixel-perfect clone of a legitimate site (e.g., a postal service, a bank login page).
  • Collection: The user is prompted to enter sensitive information, such as login credentials, personal information, or credit card details (T1539 - Steal Web Session Cookie or T1111 - Two-Factor Authentication Interception).

Jingle Thief TTPs

This campaign is more technical and automated.

  • Reconnaissance & Resource Development: Attackers likely acquire lists of compromised email/password combinations from other breaches to use in credential stuffing attacks (T1589.002 - Email Addresses).
  • Initial Access (to victim accounts): The cloud-based infrastructure launches a high-volume credential stuffing attack against retail websites, attempting to find valid logins (T1110.003 - Password Spraying).
  • Execution & Collection: Once an account is compromised, an automated script logs in, scrapes the gift card balance, and either uses it to purchase goods or sells the card details on a dark web marketplace (T1213 - Data from Information Repositories).

Impact Assessment

  • Smishing Deluge: The primary impact is widespread credential theft and financial fraud against individuals. For corporations, this can lead to compromised corporate accounts if employees use the same passwords for personal and work services.
  • Jingle Thief: This results in direct financial loss for both consumers and the targeted retail companies, who often have to reimburse customers for the stolen funds. It also causes reputational damage and a loss of customer trust.

Detection & Response

  • For Smishing: Mobile device management (MDM) solutions can be configured to block known malicious domains. Network-level DNS filtering can prevent devices on a corporate network from reaching phishing sites. User training is the most critical defense.
  • For Gift Card Fraud: Retailers must implement robust anti-bot and anti-fraud solutions. This includes detecting and blocking credential stuffing attacks, enforcing MFA on customer accounts, and monitoring for rapid, automated gift card balance checks. This aligns with D3FEND's Authentication Event Thresholding (D3-ANET).

Mitigation

  • Individuals: Be highly suspicious of unsolicited text messages. Never click links or provide personal information in response to an SMS. Manually type the URL of the legitimate service into your browser instead.
  • Organizations:
    1. User Training: Continuously educate employees about the dangers of smishing and phishing (M1017 - User Training).
    2. MFA Everywhere: Enforce MFA on all corporate accounts to mitigate the impact of stolen credentials (M1032 - Multi-factor Authentication).
    3. Credential Stuffing Protection: For public-facing applications, implement CAPTCHA, rate limiting, and services that detect and block credential stuffing attacks.
    4. DNS Filtering: Use a DNS security service to block access to known malicious and newly registered domains (M1021 - Restrict Web-Based Content).

Timeline of Events

1
October 22, 2025
Unit 42 exposes the 'Jingle Thief' cloud-based gift card fraud campaign.
2
October 23, 2025
Unit 42 publishes details on 'The Smishing Deluge,' a massive smishing campaign.
3
October 23, 2025
This article was published

Article Updates

October 24, 2025

Jingle Thief campaign evolves, now infiltrating Microsoft 365 environments, registering rogue MFA applications for persistence, and issuing unauthorized gift cards.

MITRE ATT&CK Mitigations

The primary defense against social engineering attacks like smishing is a well-trained and skeptical user base.

MFA is the most effective control against credential stuffing attacks, as a stolen password alone is not enough to gain access.

Mapped D3FEND Techniques:

Use DNS filtering and web proxies to block access to known phishing sites and malicious domains.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter 'The Smishing Deluge,' organizations should implement advanced URL Analysis at the network edge and on mobile devices. This goes beyond simple blocklists. Modern secure web gateways and DNS filtering services can analyze URLs in real-time as a user clicks them. They check for characteristics common in phishing, such as the use of URL shorteners, newly registered domains, Punycode to impersonate brands (e.g., xn--pple-43d.com for apple.com), and suspicious URL paths. By implementing this on corporate networks and via agents on corporate mobile devices, an organization can prevent users from ever reaching the malicious landing page, even if the smishing message itself reaches them. This effectively neutralizes the primary attack vector of the campaign.

To defeat automated fraud like 'Jingle Thief,' retailers and online services must implement Authentication Event Thresholding. This involves setting rules to detect and block the high-volume patterns of credential stuffing. For example, a WAF or anti-bot service should be configured to temporarily block an IP address that generates more than 5 failed login attempts across multiple accounts within one minute. More advanced logic can detect a distributed attack by correlating login failures across many IPs. Additionally, rules should be set to trigger CAPTCHA challenges or require MFA after a single failed login for an account, which disrupts automated scripts. This defensive technique directly targets the methodology of the 'Jingle Thief' campaign, making it economically unfeasible for attackers to continue their automated assault.

Timeline of Events

1
October 22, 2025

Unit 42 exposes the 'Jingle Thief' cloud-based gift card fraud campaign.

2
October 23, 2025

Unit 42 publishes details on 'The Smishing Deluge,' a massive smishing campaign.

Sources & References(when first published)

Unit 42 - Latest Cybersecurity Research
Unit 42 (paloaltonetworks.com) October 23, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SmishingPhishingFraudGift CardUnit 42Cloud SecurityChina

📢 Share This Article

Help others stay informed about cybersecurity threats