by Probe International

Toronto police disrupt first-known Canadian SMS blaster cybercrime ring

“Project Lighthouse” uncovers the first documented use in Canada of sinister “SMS blasters” — portable devices that can unleash a wave of mass phishing attacks, threatening the very fabric of public safety.

By Probe International

Toronto Police Service announced “Project Lighthouse” this month, revealing the first documented use in Canada of “SMS blasters” — portable cybercrime tools that impersonate cell towers to hijack phones and launch mass phishing attacks.

Compact enough to fit in a car trunk or backpack, sometimes fitted with roof antennas — these devices mimic a genuine cellular tower, functioning as fake base transceiver stations. Nearby phones automatically connect to them, mistaking the blasters for legitimate networks. Once connected, the devices flood phones with fraudulent text messages (smishing) impersonating banks, government agencies, couriers, and telecom providers. The messages direct victims to phishing sites designed to steal banking credentials, one-time passcodes, and personal information.

Operating in the Greater Toronto Area starting in November 2025, the scheme generated more than 13 million network disruptions over several months, affecting tens of thousands of devices. Authorities warned the interference may have also disrupted legitimate calls, including potential impacts on 911 emergency services.

On March 31, 2026, Toronto Police, in coordination with the RCMP’s National Cybercrime Coordination Centre and other agencies, arrested three young men—Dafeng Lin (27, Hamilton), Junmin Shi (25, Markham), and Weitong Hu (21, Markham)—on a total of 44 charges. These include fraud, identity offences, unauthorized interception of private communications, and (for two of them) mischief endangering life.

Investigative reporting — notably by Sam Cooper at The Bureau — places the Toronto case squarely within a documented global pattern of Chinese cybercrime operations. Similar incidents have appeared in the Philippines, Qatar, and elsewhere.

While the three arrested men are the visible, low-level faces of the crime, Cooper’s work describes this as part of a hybrid Chinese criminal enterprise that weaponizes advanced interception technology — supplied and directed from China — to conduct high-volume fraud and disruption on foreign soil. The combination of state-grade surveillance tools in civilian hands, potential public-safety risks (e.g., blocked emergency calls), and the upstream actors in China remaining beyond easy reach of Canadian law enforcement fits a model seen across multiple continents.

Toronto is already viewed by some U.S. officials as a North American hub for Chinese transnational organized crime, including fentanyl precursor money laundering through major banks. The same diaspora networks and “franchise” model appear in both financial mules/recruitment schemes (sometimes tied to United Front Work Department influence operations) and cyber ops.

Leave a comment