Tube Fraudsters Used Homemade SMS Blasters to Target Commuters in Smishing Scam
A sophisticated fraud operation targeting London Underground passengers has been revealed in court, involving homemade devices designed to capture mobile phones and send phishing messages. Zhijia Fan, 48, and Daoyan Shang, 20, allegedly wheeled large suitcases containing "SMS blasters" through Tube stations between January and March last year, the Inner London Crown Court heard.
The Smishing Plot Uncovered
Prosecutor Alex Davidson described how the pair were part of a gang that used the London Underground network—with up to five million daily journeys—as a hunting ground for their financial scam. The operation was discovered when an off-duty British Transport Police officer noticed suspicious luggage riddled with holes, leading to further investigations.
The fraudulent scheme, known as "smishing" (combining SMS and phishing), involved sending fake messages to commuters' phones as they walked past the suitcases. These messages pretended to be from delivery companies like Evri or Royal Mail, claiming failed parcel deliveries and providing sham links to resolve the issue.
How the SMS Blasters Operated
Mr Davidson explained that the homemade SMS blasters worked by masquerading as legitimate cell towers, tricking nearby phones into connecting to them instead of their normal networks. Once connected, the devices would send fraudulent messages with links to fake websites designed to harvest personal information.
"Phone numbers are targeted and fraudulent text messages are broadcast, using a rather sophisticated device which is adapted for the sole purpose of defrauding the public," the prosecutor told the jury. He described the blasters as "crude" gadgets that often broke down, housed in large suitcases reinforced with metal at the bottom and ventilated with holes to accommodate the bulky equipment.
The Alleged Conspiracy Leaders
The prosecution claims Fan was the "top boss" of the crime organization, directing others to carry out the large-scale financial scam, while Shang served as his "right-hand man." Evidence presented included Shang's phone saving Fan's contact as "top boss," suggesting Fan sat at the apex of the organized crime group.
Upon their arrest, mobile phones and antennae were found among both defendants' belongings, with Shang also discovered to have blasters in his possession. Both Fan and Shang, who have no fixed address, have denied charges of conspiracy to defraud and possessing articles to be used in fraud.
Broader Criminal Network
The court heard that other individuals were implicated in the scam. Wan Hafiz, an alleged gang member, has pleaded guilty, while another suspect, Jinhua Zhang, remains on the run after fleeing while on bail. Zhang was initially arrested in March last year when another perceptive off-duty BTP officer became suspicious of a similar holed suitcase at a train station.
Mr Davidson revealed that Fan had allegedly discussed with another accused gang member, Gatis Lauks—who has pleaded guilty to separate fraud charges—the feasibility of deploying a similar scam on the Paris Metro. "This is nonetheless further evidence which implicates Mr Fan as showing that he is someone who is in the business of defrauding members of the public," the prosecutor added.
Ongoing Legal Proceedings
The trial continues as the jury considers whether Fan and Shang were part of the conspiracy to defraud the public through the deployment of SMS blasters on the Underground. The case highlights the growing threat of smishing attacks in dense urban areas with high footfall, where limited signal conditions make phones vulnerable to connecting to illegitimate cell towers.
This elaborate scheme aimed to gather personal details to access and plunder victims' bank accounts, demonstrating how fraudsters are increasingly using technology to exploit unsuspecting commuters in public transport networks.



