Phishing

DMV Phishing Scam – Cybercriminals Target U.S. Citizens for Personal Data

A sophisticated and highly coordinated phishing campaign has swept across the United States, posing as state Departments of Motor Vehicles (DMVs) and exploiting public trust in government agencies.

Since May 2025, thousands of Americans have fallen victim to convincing SMS (smishing) messages and deceptive websites designed to harvest sensitive personal and financial information.

Delivery and Deception Tactics

The campaign relied heavily on smishing attacks, where victims received texts purportedly from their local DMV.

Spoofed to appear legitimate, these messages are often sent from numbers traced to the Philippines, warning recipients of unpaid toll violations and threatening license suspension or legal consequences unless an urgent payment is made.

The texts included fake legal codes (“[State-Name] Administrative Code 15C-16.003”) and directed victims to fraudulent websites that mimicked official DMV pages.

Once users clicked the provided link, they encountered highly realistic web pages branded for their state, complete with official-looking logos and messaging about outstanding fines.

Victims were instructed to pay a nominal fee (often $6.99) and then directed to a form that requested extensive personal information, including full name, address, email, phone number, and credit card details.

Infrastructure and Attribution

Technical analysis revealed a well-organized infrastructure. Most malicious sites followed a pattern similar to https://[state_ID]dmv.gov-[4-letter-string].cfd/pay, with newly registered domains hosted across multiple IP addresses.

Notably, a significant cluster of these sites operated from the known malicious IP 49.51.75[.]162.

The phishing campaign displayed strong operational discipline. All domains leveraged the same name servers: alidns.com and dns8.alidns.com, with the SOA contact hostmaster@hichina.com—a clear marker of Chinese domain operations.

Shared frontend assets—such as JavaScript files C18UmYZN.js and fliceXIj.js, CSS C0Zfn5GX.css, and images BHcjXi3x.gif and BkBiYrmZ.svg—indicated the use of a centralized phishing kit.

Source code embedded with Chinese-language comments further reinforced attribution to a Chinese-speaking threat actor.

Threat intelligence platforms, including Cyberint, matched these artifacts to the “Lighthouse” phishing kit, which had been previously used in similar DMV-targeted campaigns.

The campaign’s scale is staggering: over 2,000 complaints were lodged with the FBI’s IC3 in a single month, and significant national media outlets, including CBS News, Fox News, and Time Magazine, have covered the scam’s impact.

Response and Protection

Authorities in affected states New York, New Jersey, Pennsylvania, Florida, Texas, and California, issued alerts and advisories, urging citizens never to respond to unsolicited text messages or share payment details online.

The campaign has prompted improved collaboration among cybersecurity teams, telecom providers, and law enforcement to block malicious domains and enhance public awareness.

Key Recommendations

  • Individuals: Never trust unsolicited messages, always visit official DMV websites directly, and report suspicious texts to 7726 (SPAM) or the FTC.
  • Organizations: Educate users about scams, block high-abuse TLDs at the DNS level, and implement email authentication protocols.
  • Threat Intelligence Teams: Enforce IoCs in security tools and share indicators via threat intelligence platforms.

This DMV phishing scam underscores the growing sophistication of cybercriminals and the urgent need for vigilance in an increasingly digital world.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago