- Fake cell towers forced phones to disconnect from nearby legitimate networks
- Millions of outages revealed how easily cellular connections can be manipulated
- Attackers hit thousands of devices simultaneously without telecommunications infrastructure
Authorities in Canada have revealed details of a mobile cyber operation that relied on SMS transmitters mounted inside vehicles traveling through urban areas.
Three suspects drove around downtown Toronto with these hidden devices running in their cars, posing as cell phone towers.
The Toronto Police Service confirmed that this was the first such operation ever recorded in the country, and that the campaign caused 13 million network outages in total.
Article continues below.
How fake cell towers manipulate connections
Researchers say the devices mimicked legitimate cellular base stations, forcing nearby phones to connect automatically due to stronger signal proximity.
Once connected to the fraudulent system, the phones received messages that appeared to come from credible institutions.
These messages often directed users to fraudulent websites designed to extract credentials or activate unauthorized payments.
Because the communication bypassed standard telecommunications safeguards, typical protections such as carrier-level filtering became ineffective, allowing attackers to send smishing campaigns directly to inboxes at scale.
The attack reached a large number of devices simultaneously, infiltrating tens of thousands of mobile devices without relying on traditional telecommunications infrastructure.
“What makes this particularly concerning is the scale and impact,” said Toronto Deputy Police Chief Robert Johnson.
“This wasn’t targeted at a single individual or company. It had the ability to reach thousands of devices at once.”
In such cases, users may assume that installed antivirus tools or routine malware removal practices are sufficient, but these measures do not prevent forced network redirection at the signal level.
Disruption goes beyond financial damage
The effect of this fraudulent network is not limited to financial risks because users temporarily lose access to legitimate services.
This interference could affect a person’s ability to reach emergency assistance such as the police or an ambulance when necessary.
“And beyond the financial risk, there are real implications for public safety. For example, when devices stray from legitimate networks, even briefly, it interferes with a person’s ability to connect to emergency services,” Johnson said.
The SMS transmitters used for the operation were custom-made and have the potential to threaten national security.
“The ones we seized in Toronto were uniquely constructed and we will not be sharing them publicly for security reasons,” said Detective Sergeant Lindsay Riddell.
Devices comparable to SMS senders, such as IMSI receivers, can intercept and redirect communications, potentially capturing metadata or voice data.
A pattern seen beyond Canada
Although it is described as the first case recorded in Canada, similar operations have been identified internationally.
Philippine authorities arrested two Chinese nationals in February 2026 for implementing a similar plan.
Those suspects hired drivers to carry IMSI devices in the back of their vehicles while loitering near key government facilities, military bases, and even the U.S. embassy.
Similarly, London police arrested a student from China in June 2025 for using a similar device from his car to send messages to victims.
The Toronto operation has been shut down, but the vulnerability remains and traditional security tools cannot prevent a fake cell tower from hijacking your phone connection.
Through Tom Hardware
Follow TechRadar on Google News and add us as a preferred source to receive news, reviews and opinions from our experts in your feeds.



