Executive Summary

Between March 10 and March 19, 2026, a CrimsonVector analyst received three smishing text messages — two impersonating the Tennessee Department of Motor Vehicles / Department of Safety and Homeland Security, and one impersonating the Massachusetts Registry of Motor Vehicles. Despite targeting different states through different delivery channels and TLDs, the specimens share common infrastructure DNA while revealing real-time template evolution: the third specimen, arriving just nine days after the first, shows the operators correcting previously documented tells — fixing the agency name, dropping fabricated statutes, and shifting from aggressive threats to measured bureaucratic language.

Analysis of both specimens' indicators maps them directly to the Lighthouse phishing kit, a Phishing-as-a-Service (PhaaS) platform operated by a China-based cybercrime syndicate tracked as the Smishing Triad (PRODAFT designation: LARVA-241). The Lighthouse kit has powered one of the most expansive smishing campaigns in U.S. history, with over 194,000 malicious domains, an estimated $1 billion in illicit revenue over three years, and an estimated 12.7 to 115 million stolen payment cards in the United States alone.

This article documents all three specimens, traces them through the campaign's known infrastructure and tradecraft, and assesses the operational status of the Smishing Triad following Google's November 2025 RICO lawsuit and the brief disruption of Lighthouse infrastructure. The receipt of these specimens in March 2026 — targeting two different states with different TLDs, sender infrastructure, delivery protocols, and evolving social engineering language — confirms the campaign has not only reconstituted but is actively diversifying its operational footprint and refining its lure quality in response to public exposure.

The Specimens

Specimen A — Tennessee DMV (March 10, 2026)

At 10:15 AM EST on March 10, 2026, a text message was received via iMessage from the number +63 951 531 0714 (Philippines country code). The message body read:

Tennessee DMV Final Notice
Penalties Start March 11

Our records show an unpaid traffic ticket. By order of Tennessee Code 15C-16.003, payment due March 10, 2026.

1. Report violation to DMV database
2. Suspend registration starting March 11
3. 30-day suspension of driving privileges
4. Collection agency + 35% service fee
5. Legal action and credit score impact

Pay Now: https://tn.org-htmct[.]bond/dmv
Act now to prevent license suspension.
(Reply Y to use link or copy to browser.)

Smishing text message impersonating Tennessee DMV
Fig 1. Smishing text message impersonating Tennessee DMV

The recipient's device flagged the message with "If you did not expect this message from an unknown sender, it may be spam" and offered a Report Spam option — Apple's standard iMessage filtering for unknown senders.

Specimen B — Massachusetts RMV (March 17, 2026)

One week later, at 9:57 AM EST on March 17, 2026, a second text message was received — this time via SMS (green bubble, not iMessage) from the number +1 (646) 979-1895 (New York City area code). The message body read:

OFFICIAL COMMUNICATION FROM MASS RMV: Resolve your cited traffic violation immediately, prior to 03/18/26. Failure to do so will incur penalties: a permanent record mark, cancellation of your registration, a 30-day license suspension, and a 35% fine increase. Act now: https://mass.itlrj[.]life/ezdrivema

This specimen also triggered Apple's unknown-sender warning and Report Spam option.

Smishing text message impersonating Massachusetts RMV
Fig 8. Smishing text message impersonating Massachusetts RMV via SMS

Specimen C — Tennessee TDOSHS (March 19, 2026)

Nine days after the first specimen, at 4:38 PM EST on March 19, 2026, a third text message was received via iMessage from +63 939 500 6764 (Philippines). This specimen represents a significant template evolution:

Tennessee Department of Safety and Homeland Security
Citation Status Reminder

Our records indicate that your vehicle may be associated with one or more unresolved traffic citations.

Deadline to address this matter: March 20, 2026
Please review your citation status and take appropriate action as soon as possible.

For official case details or payment options, please visit the Tennessee Department of Safety and Homeland Security's official website: https://tn.org-qazxoh[.]life/dmv

If the citation remains unresolved after the deadline, a routine administrative review will be conducted in accordance with state regulations. This may lead to:
• Updates to your vehicle registration status
• Temporary restrictions on your driving privileges
• Additional administrative fees

Reply "A" to reload this notice or access the link above to proceed.

This specimen also triggered Apple's unknown-sender warning and Report Spam option.

Smishing text message impersonating Tennessee TDOSHS
Fig 9. Smishing text message impersonating Tennessee Department of Safety and Homeland Security via iMessage

Comparative Analysis

The three specimens, received across a nine-day window, reveal both the campaign's breadth and its real-time evolution:

Attribute Specimen A (TN) Specimen B (MA) Specimen C (TN)
DateMarch 10, 2026March 17, 2026March 19, 2026
Impersonated EntityTennessee DMVMassachusetts RMVTN Dept. of Safety & Homeland Security
Sender+63 (Philippines)+1 646 (NYC)+63 (Philippines)
Delivery ProtocoliMessageSMSiMessage
Payload Domaintn.org-htmct[.]bond/dmvmass.itlrj[.]life/ezdrivematn.org-qazxoh[.]life/dmv
Root Domainhtmct[.]bonditlrj[.]lifeqazxoh[.]life
TLD.bond.life.life
Fabricated Statute"Tennessee Code 15C-16.003"NoneNone
Penalty SpecificityExplicit (30-day, 35%)Explicit (30-day, 35%)Vague ("temporary," "additional")
ToneAggressive/threateningDirective/urgentBureaucratic/professional
Reply Mechanism"Reply Y"None"Reply A"
Agency Name AccuracyIncorrect ("DMV")Correct ("MASS RMV")Correct (full TDOSHS name)
Deadline PressureSame-dayNext-dayNext-day

Template evolution in real time. The progression from Specimen A to Specimen C — both targeting Tennessee, just nine days apart — is the most analytically significant finding in this investigation. Specimen A used the generic "Tennessee DMV," a fabricated statute, aggressive five-point penalties with specific numbers, and "Reply Y." Specimen C uses the correct agency name (Tennessee Department of Safety and Homeland Security), drops the fabricated statute entirely, replaces specific penalty numbers with vague bureaucratic language ("temporary restrictions," "additional administrative fees"), and rotates the reply letter to "A." The tone shifts from threatening to the kind of measured, procedural language a real government agency might use. This is iterative refinement of a social engineering template, likely informed by public reporting of the campaign's earlier tells.

Infrastructure constants persist. Despite the template overhaul, the underlying domain architecture is unchanged. Specimen C's tn.org-qazxoh[.]life/dmv follows the exact same pattern as Specimen A's tn.org-htmct[.]bond/dmv: the format tn.org-[random string].[TLD]/dmv with a Philippine +63 sender over iMessage. The skeleton is identical — only the skin has been upgraded.

TLD convergence on .life. Specimens B and C both use .life, while only Specimen A used .bond. This may indicate the campaign is consolidating on .life as its current preferred TLD, potentially because .bond has already been flagged in blocklists following abuse documentation.

Specimen B introduces a hybrid lure: the message body impersonates the Massachusetts RMV for a traffic violation, but the URL path /ezdrivema references EZDriveMA, the state's electronic toll collection system. This blends two separate Massachusetts-specific brands into a single message — a sloppy crossover that suggests the kit is drawing from a template library where toll and DMV lures share infrastructure.

Initial Triage: Red Flags at a Glance

All three specimens present high-confidence indicators of a smishing campaign, though Specimen C's refined language makes it the most convincing of the set. Specimen A is analyzed in detail below; Specimens B and C share most patterns with the variations noted in the comparative table above.

Sender origin. Specimen A's +63 country code belongs to the Philippines. No U.S. state agency would originate communications from a foreign mobile number. Specimen B uses a domestic 646 (NYC) number — a shift toward harder-to-filter sender infrastructure, though still anomalous for a Massachusetts state agency. Tennessee state government communications use @tn.gov email addresses, and the Department of Safety and Homeland Security has publicly confirmed it does not send text messages about overdue fines, fees, or license status. Likewise, Massachusetts RMV Registrar Colleen Ogilvie has publicly stated that "the Massachusetts Registry of Motor Vehicles never asks for payment via a text link."

Fabricated statute. The message cites "Tennessee Code 15C-16.003." Tennessee Code Annotated follows a Title-Chapter-Part-Section format (e.g., T.C.A. § 55-50-502 for license suspension). The cited code does not exist. As we will see, this exact citation format is a known fingerprint of the Lighthouse phishing kit.

Hostile domain architecture. Specimen A's payment URL tn.org-htmct[.]bond/dmv exploits visual parsing — the subdomain prefix tn.org- suggests a connection to Tennessee or a .org domain, but the actual registered domain is htmct[.]bond, a randomly generated string on the .bond TLD. Specimen B's mass.itlrj[.]life/ezdrivema follows the same pattern: mass. as a subdomain prefix for Massachusetts, with the real domain being itlrj[.]life — another random string, this time on the .life TLD. Neither .bond nor .life are associated with any government entity. Official Tennessee government websites operate under .gov; Massachusetts uses .mass.gov.

Phishing landing page at tn.org-htmct[.]bond/dmv
Fig 2. Phishing landing page at tn.org-htmct[.]bond/dmv

Urgency escalation cascade. The five-point penalty structure — escalating from a database report to registration suspension, license suspension, collections with a 35% fee, and finally legal action with credit impact — follows a classic social engineering pressure model designed to override critical thinking through fear of compounding consequences.

Same-day deadline. The message claims payment is due March 10, 2026 — the same day it was received — with penalties beginning March 11. This compressed timeline is a hallmark of smishing campaigns, designed to prevent recipients from independently verifying the claim.

"Reply Y" engagement technique. This is a known mechanism to bypass Apple iMessage's link protection. iMessage automatically disables clickable links in messages from unknown senders. By prompting the recipient to reply, the attacker establishes a two-way conversation, which re-enables the links for interaction in subsequent messages. It also confirms the number is live and actively monitored, making it more valuable for future targeting.

Campaign Attribution: The Lighthouse Phishing Kit

The Fabricated Statute — A Signature Fingerprint

The citation "Tennessee Code 15C-16.003" is not an isolated fabrication. In June 2025, Check Point Research published a detailed analysis of a DMV-themed phishing campaign impersonating multiple U.S. state DMVs, noting that the scam messages routinely cited fictitious legal codes following the exact pattern "[State-Name] Administrative Code 15C-16.003." This identical template has been documented across Tennessee, Nebraska, Colorado, New York, New Jersey, California, Florida, Texas, and other states — with only the state name and payment deadline swapped per target.

Earlier documented Tennessee specimens from June 2025 cited "North Tennessee State Administrative Code 15C-16.003" — a doubly fabricated reference, since "North Tennessee" does not exist as a jurisdictional entity. Specimen A (March 10) shows a first-pass refinement: the template has been updated to the more plausible "Tennessee Code," suggesting iterative improvement of the lure language. But Specimen C (March 19) goes further — it drops the fabricated statute entirely. This is a significant operational indicator: public reporting of the "15C-16.003" pattern as a campaign fingerprint (including by Check Point, WKRN, and multiple law enforcement agencies) appears to have driven the operators to remove it altogether. The fabricated statute is becoming a burned indicator — still useful for detecting earlier variants, but no longer reliable as a sole detection signal for current-generation templates.

Sender Infrastructure: Philippine Origin

Check Point's analysis confirmed that the SMS messages in this campaign were primarily sent from spoofed numbers traced to origins in the Philippines. The +63 country code on the March 2026 specimen is consistent with this documented delivery infrastructure. The Smishing Triad's operational model leverages SMS gateways and spoofing techniques to send messages at scale — thousands per hour, according to FBI Supervisory Special Agent David Palmer, who described the operation as run by organized criminal groups overseas using technology and AI for mass message delivery.

Domain Analysis: TLD Rotation to .bond and .life

The earlier wave of the campaign, documented extensively by Check Point, Palo Alto Networks Unit 42, and Silent Push, relied heavily on .cfd and .win TLDs, following the pattern https://[state_ID]dmv.gov-[4-letter-string].cfd/pay. These TLDs were chosen for their low registration cost and minimal verification requirements. EZDriveMA-specific spoofing domains used .top and .xin patterns, such as ezdrivema.com-payzk.top and ezdrivema.com-woleww.xin.

The March 2026 specimens use two new TLDs.bond and .life — neither of which appear in the earlier documented campaigns. The .bond extension, managed by ShortDot SA and available since 2019, has become heavily associated with cybercriminal abuse. Research by Infoblox documented the "Revolver Rabbit" cybercriminal gang registering over 500,000 domains on .bond alone for malware distribution, and Spamhaus has consistently ranked .bond among the TLDs with the highest rates of malware association.

The domain structure also shows evolution. Where earlier specimens used a pattern like nydmv.gov-abcd[.]cfd/pay (embedding a state identifier and .gov string in the subdomain), the March 2026 specimens use simpler subdomain prefixes — tn.org- and mass. — potentially to evade pattern-based detection rules written against the earlier dmv.gov- format.

Specimen B's /ezdrivema URL path is particularly notable. EZDriveMA is Massachusetts' electronic toll collection system — a completely separate entity from the RMV. The message body claims to be about a traffic violation (an RMV matter), but the URL references the toll system. This hybrid construction suggests the kit is drawing from a shared template library where toll scam and DMV/RMV lure components are mixed, possibly by operators who lack familiarity with the distinctions between U.S. state agencies. Previous EZDriveMA smishing campaigns, documented by MassDOT as early as June 2024, also used Philippine +63 sender numbers — though Specimen B has shifted to a domestic NYC number.

Silent Push infrastructure analysis for tn.org-htmct[.]bond
Fig 3. Silent Push infrastructure analysis for tn.org-htmct[.]bond
VirusTotal detection for the malicious domain
Fig 4. VirusTotal detection for the malicious domain
URLScan.io result for tn.org-htmct[.]bond
Fig 5. URLScan.io result for tn.org-htmct[.]bond
URLScan.io HTTP transactions and behavior
Fig 6. URLScan.io HTTP transactions and behavior
URLScan.io DOM capture showing standard authentication fields
Fig 7. URLScan.io DOM capture showing standard authentication fields

The Smishing Triad: Threat Actor Profile

Identity and Attribution

The Lighthouse phishing kit is the operational product of a China-based cybercrime syndicate tracked under multiple designations:

Designation Source
Smishing Triad Resecurity, Silent Push, Check Point
LARVA-241 PRODAFT
Wang Duo Yu / Lao Wang Individual developer attribution

The kit's developer, tracked as Wang Duo Yu, has been described as a computer science student in China who monetized his technical skills through PhaaS development. He sold access to the Lighthouse kit on Telegram channels, with pricing ranging from $50 for full-feature deployments to $20 for version updates and miscellaneous support.

The Smishing Triad operates not as a single monolithic group, but as a phishing-as-a-service ecosystem — a supply chain of specialized criminal actors including data brokers, domain sellers, hosting providers, phishing kit developers, SMS and RCS spammers, and blocklist evasion specialists. Silent Push reported the group boasted "300+ front desk staff worldwide" supporting kit operations.

Scale of Operations

The numbers behind the Smishing Triad are staggering:


The kit targeted an extraordinarily broad range of sectors: postal and logistics services, telecommunications, transportation and toll systems, financial institutions, retail, government agencies, and public services. The DMV impersonation campaign represents just one operational vertical within a much larger enterprise.

Technical Infrastructure

Check Point's forensic analysis of the campaign revealed a highly structured technical footprint:

DNS infrastructure. All associated phishing domains in the documented campaign used Alibaba's DNS services (alidns.com / dns8.alidns.com), with SOA contact addresses pointing to hostmaster@hichina.com — a strong attribution link to Chinese domain operations.

Web asset fingerprinting. DOM analysis revealed each phishing site included a static set of five reused files: two JavaScript files (C18UmYZN.js, fliceXIj.js), one CSS file (C0Zfn5GX.css), and two image assets (BHcjXi3x.gif, BkBiYrmZ.svg). This reuse across thousands of domains confirmed a centralized phishing kit model.

Source code attribution. Chinese-language comments were found embedded in the phishing site source code, reinforcing attribution to Chinese-speaking developers.

Hosting concentration. Over 50% of DNS query volume for Smishing Triad domains was served from U.S.-based infrastructure, particularly Cloudflare (AS13335), while domain registration concentrated in China through Hong Kong-based registrar Dominet (HK) Limited. This hybrid model — Chinese registration with U.S. hosting — provides both resilience and the performance benefits of major cloud providers.

The Tennessee Context

Tennessee has been a particularly notable target in this campaign's evolution. FBI Supervisory Special Agent David Palmer, who supervises white-collar crime investigations in West Tennessee, provided crucial context in a June 2025 interview: the DMV smishing wave is a direct successor to the toll road scam that swept the country earlier. As Palmer noted, the toll scam struggled in Tennessee because the state has no toll roads, so the criminal organizations adapted — pivoting from tolls to DMV impersonation.

The Tennessee Department of Safety and Homeland Security (TDOSHS) and the Tennessee Highway Patrol both issued formal warnings, confirming that TDOSHS does not send text messages about overdue traffic fines, fees, payments, or license status. Multiple local agencies — Clarksville Police Department, Kingsport Police Department, Johnson City Police Department, and the Washington County Sheriff's Office — also issued public alerts.

The refinement visible across our March 2026 specimens documents three generations of Tennessee-targeting templates. The June 2025 wave used "North Tennessee State Administrative Code 15C-16.003" and "Tennessee Department of Vehicles" — both containing easy-to-spot errors. Specimen A (March 10) corrected the agency reference to "Tennessee DMV" and simplified the statute to "Tennessee Code 15C-16.003" — still fabricated, but more plausible. Specimen C (March 19) represents a generational leap: the correct full agency name, no fabricated statute, professional bureaucratic tone, and hedging language ("may be associated," "may lead to"). This three-stage progression — visible across just nine months of documented activity — demonstrates the speed at which PhaaS template quality is improving. As Massachusetts RMV Registrar Colleen Ogilvie warned at a state budget hearing just days before Specimen C was sent: "With the advance of AI technology and advanced technologies, these bad actors can adjust these messages really quickly to make them really look like state-issued messages."

Post-Disruption Resurgence

The Google Lawsuit (November 2025)

On November 12, 2025, Google filed a landmark civil lawsuit in the U.S. District Court for the Southern District of New York against 25 unnamed individuals under the Racketeer Influenced and Corrupt Organizations (RICO) Act, the Lanham Act, and the Computer Fraud and Abuse Act (CFAA). Google described Lighthouse as a "phishing for dummies" tool and detailed its role in powering massive volumes of smishing attacks globally.

Within days, Lighthouse operations appeared to be disrupted. The threat actors posted a Chinese-language message on Telegram stating their "cloud server has been blocked due to malicious complaints." Silent Push confirmed that all previously tracked Lighthouse Telegram channels were deleted or taken down for Telegram Terms of Service violations.

Signs of Reconstitution

However, the disruption was incomplete. Silent Push noted at the time that many websites were still active using Lighthouse kit code, and other Smishing Triad-associated phishing kits remained operational. The broader PhaaS ecosystem — including related platforms like Darcula and Lucid — continued to function.

The March 2026 specimens received by CrimsonVector confirm that the campaign has resumed active operations against multiple U.S. states simultaneously, with notable tactical adjustments:

  1. TLD rotation — shifting from .cfd and .win to .bond and .life, with apparent convergence on .life (used in two of three specimens), likely to evade domain-level blocking rules implemented after the earlier waves

  2. Aggressive template refinement — Specimen C (March 19) corrects the agency name to "Tennessee Department of Safety and Homeland Security," drops the fabricated statute fingerprint, and adopts professional bureaucratic language — all within nine days of Specimen A's more primitive variant hitting the same target state

  3. Diversified sender infrastructure — using both Philippine international numbers (Specimens A, C) and domestic U.S. numbers with major metro area codes (Specimen B, 646/NYC)

  4. Protocol diversification — deploying via both iMessage (Specimens A, C) and SMS (Specimen B), maximizing coverage across Apple's messaging ecosystem

  5. Hybrid lure construction — blending RMV and EZDriveMA brands in Specimen B, suggesting operators are mixing template components from the kit's toll and motor vehicle libraries

  6. Reply mechanism rotation — shifting from "Reply Y" (Specimen A) to "Reply A" (Specimen C), likely to evade carrier-level content filtering tuned to the earlier pattern

  7. Indicator burndown — the removal of the "15C-16.003" statute and the correction of agency names suggest the operators are actively monitoring public reporting and security research about their campaign

This pattern is consistent with the Smishing Triad's documented operational resilience. Unit 42 found that 83% of the group's domains were active for less than two weeks, with 29% lasting only two days — a domain churning strategy specifically designed to outpace blocklists and takedowns. The shift to .bond TLDs represents a continuation of this approach at the TLD level itself.

Indicators of Compromise (IOCs)

March 2026 Specimens

Specimen A — Tennessee DMV (March 10, 2026)

Sender +63 951 531 0714 (Phone Number)
Sender Country Philippines (+63) (Origin)
Payload URL tn.org-htmct[.]bond/dmv (Domain)
Root Domain htmct[.]bond (Domain)
TLD .bond (Infrastructure)
Fabricated Statute "Tennessee Code 15C-16.003" (Lure Element)
Delivery Vector iMessage (SMS/RCS) (Method)

Specimen B — Massachusetts RMV (March 17, 2026)

Sender +1 (646) 979-1895 (Phone Number)
Sender Area Code New York City (646) (Origin)
Payload URL mass.itlrj[.]life/ezdrivema (Domain)
Root Domain itlrj[.]life (Domain)
TLD .life (Infrastructure)
Spoofed Brand EZDriveMA (MA toll system) (Lure Element)
Delivery Vector SMS (Method)

Specimen C — Tennessee TDOSHS (March 19, 2026)

Sender +63 939 500 6764 (Phone Number)
Sender Country Philippines (+63) (Origin)
Payload URL tn.org-qazxoh[.]life/dmv (Domain)
Root Domain qazxoh[.]life (Domain)
TLD .life (Infrastructure)
Impersonated Agency TN Dept. of Safety & Homeland Security (Lure Element)
Reply Mechanism "Reply A" (Engagement)
Delivery Vector iMessage (Method)
Historical Campaign IOCs (Check Point Research, June 2025)
Known Malicious IP 49.51.75[.]162 (Infrastructure)
DNS Provider alidns.com / dns8.alidns.com (Infrastructure)
SOA Contact hostmaster@hichina[.]com (Attribution)
Domain Pattern [state_ID]dmv.gov-[string].[TLD]/pay (Infrastructure)
JS Asset C18UmYZN.js (Kit Fingerprint)
JS Asset fliceXIj.js (Kit Fingerprint)
CSS Asset C0Zfn5GX.css (Kit Fingerprint)
Image Asset BHcjXi3x.gif (Kit Fingerprint)
Image Asset BkBiYrmZ.svg (Kit Fingerprint)
State-Specific HTML File Hashes (SHA-256)
NJ288f3cb007f3ad99835a541b6be7e07f64aa7f7a56025518f02a1f0af41585b0
CA5df0fcc2b6b3d3e52fb635c0b7bac41d27b5b75cbfeb16c024d66a59657d5535
TX94126506523ebbf35ec9689f593d061453ab39395bf63098464dcbc270ee7f48
FL2f71a0956b7f073735dab092b0fb8e4c222538cf0a6bbdf7517a02ece6934157
GAe88b894cc69c4f4ec5f6fdb2e7a0314601241571bf02154412c0168973fdc4df
PA5c7b246ec5b654c6ba0c86c89ba5cbaa61d68536efc32283da7694ed8e70b16d

Defensive Recommendations

For Individuals

For Organizations and Security Teams

Conclusion

The three specimens analyzed in this investigation are not isolated scam texts. They are nodes in one of the most extensive phishing-as-a-service operations ever documented — a China-based criminal ecosystem that has registered nearly 200,000 malicious domains, stolen tens of millions of payment cards, and generated over a billion dollars in illicit revenue across 120+ countries.

The Smishing Triad's pivot from toll scams to DMV/RMV impersonation demonstrates adversarial adaptation. The progression from Specimen A to Specimen C — both targeting Tennessee, nine days apart — demonstrates something more concerning: active template evolution informed by defensive reporting. The operators are reading the news. They corrected the agency name that law enforcement flagged. They dropped the fabricated statute that security researchers documented as a fingerprint. They softened the language that consumer advocates identified as a red flag. The next generation of this template will be harder to distinguish from a legitimate government communication by visual inspection alone.

The three specimens together paint a picture of an operation diversifying across every variable: state targets, sender infrastructure (Philippine vs. domestic U.S. numbers), delivery protocols (iMessage vs. SMS), TLDs (.bond, .life), lure construction, and social engineering tone. The persistent infrastructure pattern — [state].org-[random].[TLD]/dmv with Philippine sender numbers — remains the most reliable detection anchor, even as the message content evolves.

For residents of any U.S. state, the core message is straightforward: your state DMV, RMV, or Department of Motor Vehicles will never text you about unpaid tickets, and any message claiming otherwise is a scam — even if it sounds professional and cites the correct agency name. For the threat intelligence community, these specimens confirm the Smishing Triad's campaign remains active, operationally resilient against takedown efforts, and engaged in rapid iterative refinement that is actively burning previously documented indicators of compromise.

References

  1. Check Point Research. "DMV-Themed Phishing Campaign Targeting U.S. Citizens." Check Point Blog. June 17, 2025.
  2. Tennessee Department of Safety and Homeland Security. "Tennessee Department of Safety and Homeland Security and Tennessee Highway Patrol Warn of 'Outstanding Traffic Ticket' Scam." June 5, 2025.
  3. WREG News. "FBI investigates viral DMV text scam; unpaid ticket message is fake." June 11, 2025.
  4. Palo Alto Networks Unit 42. "The Smishing Deluge: China-Based Campaign Flooding Global Text Messages." November 20, 2025.
  5. Google. Lawsuit Filing, U.S. District Court, Southern District of New York. November 12, 2025.
  6. Dark Reading. "Google Looks to Dim 'Lighthouse' Phishing Kit." November 12, 2025.
  7. The Hacker News. "Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform." November 18, 2025.
  8. SecurityWeek. "Google Says Chinese 'Lighthouse' Phishing Kit Disrupted Following Lawsuit." November 14, 2025.
  9. CyberScoop. "Google, researchers see signs that Lighthouse text scammers disrupted after lawsuit." November 14, 2025.
  10. Silent Push. "Smishing Triad: Chinese eCrime Group Targets 121+ Countries, Intros New Banking Phishing Kit." May 15, 2025.
  11. The Hacker News. "Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation." October 24, 2025.
  12. WKRN News. "Middle TN authorities warn about traffic ticket scam texts." June 5, 2025.
  13. CircleID. "An Unnatural .Bond: A Study of a 'Megacluster' of Malware Domains." July 2024.
  14. Online Threat Alerts. "Nebraska DMV Text Scam." March 8, 2026.
Smishing Phishing-as-a-Service Lighthouse Smishing Triad LARVA-241 Tennessee Massachusetts DMV/RMV Impersonation EZDriveMA OSINT

CrimsonVector is the investigative research practice of Diego Parra. Defanged URLs and IPs are intentionally bracketed per responsible disclosure conventions. Do not attempt to access any listed indicators.