Skip to content
Tech News
← Back to articles

Canada arrests three for operating “SMS blaster” device in Toronto

read original get SMS Text Message Blocker → more articles
Why This Matters

The arrest of operators using an 'SMS blaster' device in Toronto highlights emerging threats in mobile security, where malicious actors can impersonate cellular towers to distribute phishing messages en masse. This development underscores the need for enhanced security measures and awareness among consumers to protect personal information and maintain network integrity. It also signals the importance for authorities and industry stakeholders to monitor and combat such rogue device operations to safeguard public safety and trust in mobile communications.

Key Takeaways

Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts to nearby phones.

Such tools trick devices into connecting to them by emitting signals that mimic a legitimate tower. Mobile phones in its range automatically link to them as there is stronger reception.

Once the connection is established, the operators of these rogue cellular base stations can push SMS messages directly to connected devices, which appear to come from trusted entities such as banks or the government.

“An SMS blaster works by mimicking a legitimate cellular tower. When nearby phones connect to it, users receive fraudulent text messages that appear to come from trusted organizations,” explains the police.

“These messages often prompt recipients to click on links that lead to fake websites designed to capture personal information, including banking credentials and passwords.”

No phone numbers are required for these messages to be sent; only that the targets be within range. In densely populated areas, this practically means mass distribution, and hence the name “blaster.”

The Canadian authorities noted that this is the first time that such a device has been spotted in the country.

The Toronto Police said the investigation, dubbed ‘Project Lighthouse,’ began in November 2025 after receiving tips about suspicious activity in downtown Toronto.

Police found that the equipment was operated from vehicles, allowing it to move across the Greater Toronto Area and target large numbers of people.

The investigators believe that during the SMS blaster’s operation, 13 million cases of mobile network entrapment occurred.

... continue reading