Threats

Toronto Police Bust Canada's First SMS Blaster Criminal Operation, Arrest Three

April 26, 2026 04:00 · 5 min read
Toronto Police Bust Canada's First SMS Blaster Criminal Operation, Arrest Three

Canada's First SMS Blaster Case

The Toronto Police Service has arrested three men in what authorities are calling Canada's first known criminal case involving a mobile SMS blaster — a sophisticated device capable of impersonating a legitimate cellular base station to flood nearby phones with phishing text messages while simultaneously disrupting mobile network connectivity.

The investigation, police confirmed on Thursday, was launched last November after authorities received a tip about a suspicious device operating in downtown Toronto. Over the months that followed, investigators tracked the device as it moved through multiple locations across the Greater Toronto Area.

How the Investigation Unfolded

Two of the suspects were taken into custody in March, at which point police seized a significant quantity of electronic equipment — including several SMS blasters. A third individual surrendered to authorities earlier this week, completing the trio of arrests tied to the operation.

The scale of the disruption caused by the devices is striking. During the period the blasters were in operation, tens of thousands of mobile phones are believed to have connected to the rogue system. In total, authorities recorded more than 13 million network disruptions attributed to the devices.

Those disruptions were not merely an inconvenience. Because the SMS blaster forces nearby phones to connect to it rather than legitimate towers, it can temporarily sever those devices from official cellular networks — potentially cutting off access to emergency services like 911 for periods ranging from a few seconds to several minutes.

Officials Highlight the Threat's Unprecedented Scale

"This is a new and emerging threat in Canada — one that uses advanced technology to reach thousands of people at once and exploit their trust. What makes this particularly concerning is the scale and impact. This wasn't targeting a single individual or business. It had the ability to reach thousands of devices at once."

That warning came from Deputy Chief Robert Johnson, who emphasized that the indiscriminate nature of the attack sets it apart from more conventional cybercrime.

How SMS Blasters Work

SMS blasters — sometimes referred to as rogue base stations or IMSI catchers — function by broadcasting signals that mimic those of legitimate cellular towers. Nearby handsets, following standard mobile network protocols, automatically connect to what they perceive as the strongest available signal. Once a device is connected to the rogue tower, the operator can push text messages to it that appear to come from trusted entities such as banks or government agencies.

These messages typically include links pointing to fraudulent websites engineered to harvest sensitive personal data, including banking credentials and passwords. The technique is broadly classified as smishing — a portmanteau of SMS and phishing.

A particularly dangerous secondary effect is that while a phone is attached to the rogue system, it may be unable to reach legitimate networks, effectively becoming isolated from the broader telecommunications infrastructure.

A Pattern Seen Around the World

Canada is not the first country to encounter this threat. Similar SMS blaster operations have been documented in Greece, Thailand, Indonesia, Qatar, and the United Kingdom, and the attacks often follow a similar playbook: telecom equipment concealed inside a vehicle, which is then driven through densely populated urban areas to maximize the number of targeted devices.

Investigation Ongoing

Canadian police have not disclosed the identities of the three suspects, nor have they confirmed whether any victims suffered direct financial losses as a result of the smishing campaign. The investigation remains open and active.

The case marks a significant milestone for Canadian law enforcement, illustrating that the SMS blaster threat — long documented overseas — has now firmly arrived on domestic soil. Security experts and mobile network operators will be watching closely to see whether this arrest leads to clearer regulatory guidance around the use and detection of rogue base station technology.


Source: The Record

Source: The Record

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free