Post

Canada Arrests Three for Operating SMS Blaster Device in Toronto

Canada Arrests Three for Operating SMS Blaster Device in Toronto

Canada Arrests Three for Operating SMS Blaster Device in Toronto 🚨

Canadian authorities have arrested three men for operating an “SMS blaster” device that pretends to be a cellular tower to send phishing texts to nearby phones. This is the first time such a device has been spotted in the country! 🇨🇦

How It Works

An SMS blaster works by mimicking a legitimate cellular tower. When nearby phones connect to it, users receive fraudulent text messages that appear to come from trusted organizations. These messages often prompt recipients to click on links that lead to fake websites designed to capture personal information, including banking credentials and passwords. 📱💔 No phone numbers are required for these messages to be sent; only that the targets be within range. In densely populated areas, this practically means mass distribution, hence the name “blaster”.

Investigation Details

The Toronto Police said the investigation, dubbed ‘Project Lighthouse,’ began in November 2025 after receiving tips about suspicious activity in downtown Toronto. Police found that the equipment was operated from vehicles, allowing it to move across the Greater Toronto Area and target large numbers of people. The investigators believe that during the SMS blaster’s operation, 13 million cases of mobile network entrapment occurred. 🚔

Besides the phishing aspect, devices connected to those rogue stations are temporarily disconnected from their provider’s legitimate network and cannot reach emergency services if needed. The police conducted searches in Markham and Hamilton on March 31, seizing multiple SMS blasters and other electronic devices. Two suspects were arrested, while a third man turned himself in on April 21.

Safety Recommendations

To defend against rogue towers, users are recommended to disable 2G downgrades on Android, although this measure is not effective against more advanced setups targeting LTE/5G signaling. SMS should be treated as an insecure channel, and users should avoid following links received over this channel. For sensitive data or communication exchanges, the recommendation is to use end-to-end encrypted channels. 🔒

Read full article

This post is licensed under CC BY 4.0 by the author.