Security & Infrastructure Tools
Canada arrests three for operating “SMS blaster” device in Toronto
Canadian authorities have arrested three men in Toronto for operating an "SMS blaster" that mimics a cellular tower to send phishing texts. The rogue base stations, which can move across the Greater Toronto Area, allegedly entrapged about 13 million mobile users and could disconnect devices from legitimate networks, potentially hindering emergency services. The investigation, dubbed Project Lighthouse, began in November 2025; two suspects were arrested March 31 in Markham and Hamilton, with a third turning himself in on April 21. This is the first known sighting of such a device in Canada. Officials advise treating SMS as insecure, avoiding links in texts, and using end-to-end encrypted channels for sensitive communications, while noting that disabling 2G downgrades is recommended as an additional precaution.

CANADA ARRESTS THREE FOR OPERATING “SMS BLASTER” DEVICE IN TORONTO
- Overview
- Canadian authorities have arrested three men in connection with the operation of an “SMS blaster” device in Toronto.
- The rogue system posed as a cellular tower, enabling the delivery of phishing text messages to nearby mobile devices.
- The incident marks the first documented appearance of this kind of device within Canada.
- What is an SMS Blaster?
- An SMS blaster is a device that mimics a legitimate cellular base station, broadcasting signals that cause nearby phones to connect automatically.
- Once connected, the operators can push short message service (SMS) content directly to the devices.
- Texts from these rogue stations appear to originate from trusted entities such as banks or government agencies.
- The technology allows mass distribution of messages without needing to know individual phone numbers, as long as targets are within range.
- In densely populated urban areas, this capability can reach large numbers of people in a short period.
- How it worked in practice
- Phones within the blaster’s range would link to the device because of stronger reception.
- The messages were designed to prompt recipients to click links that led to fake websites intended to capture personal information, including banking credentials and passwords.
- The operation could disconnect affected devices from their legitimate mobile networks temporarily, complicating access to normal services including emergency communications.
- Investigation timeline
- The inquiry into the activity began in November 2025, following tips about suspicious behavior in downtown Toronto.
- Investigators traced the equipment to mobile-vehicle deployments, enabling the system to move across the Greater Toronto Area and target large audiences.
- Police estimated that during the blaster’s activity, millions of network entrapments occurred, with a figure approaching 13 million in observed cases.
- The devices and related equipment were found during searches conducted in Markham and Hamilton on March 31.
- Arrests and seizures
- Two suspects were initially apprehended following the March 31 searches.
- A third man turned himself in on April 21, bringing the total arrest count to three.
- The investigation, named Project Lighthouse, involved seizures of multiple SMS blasters and other electronic devices, underscoring the scale of the operation.
- Scope and potential impact
- The operation demonstrated how rogue cellular base stations can undermine trust in legitimate networks and undermine standard security measures.
- Beyond phishing, the ability to push messages indiscriminately raises concerns about privacy, data security, and the reliability of emergency communications during such incidents.
- The Canadian authorities highlighted that the device’s use could temporarily sever connections to the official provider, creating a window of vulnerability for users.
- Context and official statements
- Law enforcement described the SMS blaster as a legitimate-sounding but fraudulent network asset that exploits standard messaging channels to propagate scams.
- Officials emphasized that messages often lure recipients to counterfeit sites designed to collect sensitive information.
- The case is notable for its novelty in Canada, illustrating an emerging threat class that combines physical-layer manipulation with social-engineering phishing tactics.
- Related developments and ongoing coverage
- The broader cybersecurity landscape has been watching closely for similar deployments and the evolution of rogue base-station technologies.
- Parallel cases in other regions have showcased the potential for tens of millions of targeted texts originating from non-standard sources, underscoring the need for continued vigilance.
- Ongoing reporting continues to explore how authorities identify, track, and neutralize such devices, along with the legal frameworks governing their prosecution.
- Sector implications
- The incident underscores the importance of robust digital forensics in tracing illicit infrastructure that masquerades as legitimate network components.
- It also highlights the ongoing tension between convenience and security in modern communications, where SMS remains a widely used channel for both legitimate alerts and criminal activity.
- The event serves as a case study in the vulnerabilities of mobile ecosystems when confronted with rogue signaling devices.
- Takeaway reflection
- The Toronto case demonstrates that even trusted communication channels can be weaponized, with consequences ranging from targeted credential theft to broader disruption of everyday mobile access.
- The arrests and seizures signal a clear governmental willingness to pursue complex, cross-jurisdictional threats that operate at the intersection of hardware, software, and social manipulation.