Mobile SMS Blasters Prowled Canadian Streets, Blocking 911 Calls and Stealing Phone Data
A “mobile SMS blaster” deployed from vehicles in Toronto mimicked cell towers, hijacked tens of thousands of phones, and caused 13 million network disruptions—temporarily blocking 911 access while sending massive volumes of fraudulent texts under Project Lighthouse.
TORONTO, ONTARIO — In a first-of-its-kind cybercrime investigation in Canada, the Toronto Police Service has dismantled a sophisticated "drive-by" smishing operation that turned city streets into a digital battlefield. Known as Project Lighthouse, the probe revealed that suspects used vehicle-mounted "SMS blasters" to hijack mobile connections, causing millions of network disruptions and potentially endangering public safety by impairing access to 911 services.
The operation involved vehicles cruising through downtown Toronto and the Greater Toronto Area (GTA). These cars were equipped with custom-built radio equipment designed to mimic legitimate cellular towers, tricking nearby mobile devices into disconnecting from the secure carrier network and "latching" onto the rogue pirate site.
The Mechanics of a "Mobile Blaster"
Technically, the devices seized by police function similarly to IMSI-catchers — often called "Stingrays" — but are specialized for high-volume smishing and SMS fraud. By projecting a signal stronger than actual cell towers in a localized area, the blaster forces phones to perform a "handover" to the attacker's hardware.
Once a phone is connected to the blaster, the attackers gain significant control:
- Mass Smishing: The device sends fraudulent text messages directly to every phone in the vicinity. These messages posed as trusted entities like Canada Post, major banks, and government agencies.
- Network Hijacking: Because the device is not connected to the actual cellular backbone, the "tens of thousands" of hijacked phones lose their ability to send or receive legitimate traffic.
- 13 Million Disruptions: Investigators recorded a staggering 13 million instances where devices were knocked off their legitimate carrier networks, a pattern that points to a persistent, repetitive operation across the city.
A Public Safety Incident: The 911 Risk
The most alarming aspect of Project Lighthouse is the impact on emergency services. While the perpetrators were targeting financial credentials, their equipment created a "dead zone" for legitimate cellular communication.
According to reporting from Tom's Hardware and Global News, police warned that during these hijacked windows, a victim’s ability to reach 911 could have been impaired. Because the phone believes it is connected to a tower, it may fail to seek an alternative emergency network, effectively silencing the device during a critical moment. This transition from "fraud" to "public safety threat" marks a dangerous shift in the telecom-security landscape.
Defender Angle: Detecting the Drive-By
For residents, this incident serves as a stark reminder that mobile-security is not just a software issue; it is an RF (Radio Frequency) issue.
Red Flags for Users:
- Sudden Signal Drops: If your phone suddenly loses LTE/5G bars in a high-coverage urban area or switches to an older protocol (like 2G), it may be a sign of a nearby IMSI-catcher or blaster.
- Unsolicited High-Pressure Texts: Messages that arrive precisely when your signal flickers, claiming an "urgent delivery failure" or "bank account freeze," should be treated with extreme skepticism.
For law enforcement and telecom providers, the "Project Lighthouse" case demonstrates the need for advanced RF monitoring in urban centers to identify mobile anomalies that move through traffic.
The CyberSignal Analysis: Strategic Signals
Signal 01 — The Physicality of Phishing
Phishing is no longer just a "link in an email." By using vehicles, attackers have created a mobile attack surface that exploits the physical geography of a city. This "city-as-a-lab" approach allows criminals to harvest thousands of victims in a single afternoon commute.
Signal 02 — Criminalization of Nation-State Tools
The "SMS blaster" is a specialized derivative of IMSI-catcher technology once reserved for intelligence agencies. Its appearance in the hands of three suspects in Toronto suggests a rapid commodification of high-end radio-hacking hardware.
Signal 03 — The 911 "Collateral Damage"
Attackers are becoming increasingly indifferent to the collateral damage of their operations. By prioritizing smishing volume over network stability, the Project Lighthouse actors demonstrated that the disruption of emergency services is now an acceptable "overhead" for cyber-criminal enterprises.