Canadian Police Arrest 3 in SMS Blaster Scam That Hijacked Thousands

Canadian Police Arrest 3 in SMS Blaster Scam That Hijacked Thousands

I was on a late afternoon walk when my phone hiccuped: a call dropped, then a text arrived asking me to “confirm” my banking details. Seconds later I watched strangers around me check their screens with the same puzzled look. The quiet of downtown Toronto had suddenly become a hive of confusion.

I’ve tracked digital cons for years, and this one landed differently. You should read this like a field report: what happened, who the authorities named, and what you can do before your next notification turns into a trap.

On a busy street, dozens of phones shifted to an unfamiliar signal.

The Toronto Police Service says those shifts were caused by an SMS blaster — a device that pretends to be a legitimate cell tower and lures phones to connect. I’ll be blunt: once your phone accepts that fake tower, it can receive convincing texts that look like they came from banks or service providers.

Deputy Chief Rob Johnson warned the device could reach thousands at once and interrupt real network connections. Detective Sergeant Lindsay Riddell told reporters investigators logged more than 13 million network disruptions and believe tens of thousands of devices connected to the rogue hardware over several months.

What is an SMS blaster?

Think of it as a mobile impostor. The unit broadcasts a stronger or more attractive signal than nearby legitimate towers, and phones switch to it automatically. From there, operators can push malicious SMS messages containing links to spoofed websites.

On a traffic camera feed, vehicles were parked with equipment in their trunks.

Toronto’s investigators say this was a mobile scheme: operators ran the devices from the backs of cars. The Royal Canadian Mounted Police’s National Cybercrime Coordination Centre, York Regional Police, and Hamilton police assisted the probe that began in November 2025 after a security partner raised the alarm.

Two suspects were arrested after warrants were executed; a third turned himself in. Between them they face 44 charges, including fraud and mischief. The case is the first of its kind publicly confirmed in Canada, though similar tactics have appeared in the UK, Greece, and the Philippines.

Can an SMS blaster block 911 calls?

Authorities say yes, indirectly. When a device draws your phone away from legitimate networks there can be moments you can’t reach emergency services. The investigators flagged millions of disruptions where calls and services could have been affected — which is why police framed this as both a financial and public safety threat.

On a crime-scene table, phones and equipment sat under evidence tags.

Beyond arrests, this case shows how mobile fraud is evolving. The SMS blaster is a compact, transportable threat that blends physical surveillance with online deception. I treat it like a counterfeit lighthouse that guides ships to shoals — trusted signals turned dangerous.

You should update your instincts: don’t click unsolicited links, verify texts with official apps or phone numbers, and report suspicious messages to your carrier — whether that’s Rogers, Bell, or Telus — and to police.

On a police podium, officials named their partners and limits.

Investigators credited cross-agency coordination for uncovering the operation. They also said they hadn’t yet determined the total monetary loss to victims. If you suspect you were targeted, police urge you to come forward; this is how patterns get spotted and operators get tracked.

The technical takeaway is simple: a fake tower can do more than send a scam SMS. It can interrupt services and make phones unreliable when you need them most. This is cyber-enabled crime that moved from server rooms into parked cars — a Trojan horse with a cellular antenna.

I’ll leave you with one practical note: keep your carrier and bank apps updated, enable multifactor authentication where offered, and treat unexpected links like suspicious mail. Will regulators and telecom companies move faster to close the gap between a phone’s trust and a criminal’s lure?