Beware of This SMS Scam: How to Block and Stay Safe

Polish cybersecurity researchers have uncovered a sophisticated SMS-based phishing campaign targeting Android users with a zero-day exploit in Google’s RCS (Rich Communication Services) protocol, exposing over 12 million devices to credential theft and remote code execution. The attack, dubbed “HelixStrike,” leverages AI-powered message generation and adaptive social engineering to bypass traditional spam filters, marking a structural shift in how threat actors weaponize real-time communication platforms.

The Anatomy of HelixStrike: How AI Turns SMS Into a Weapon

The exploit chain begins with a seemingly innocuous SMS containing a malicious RCS invitation link. Unlike traditional SMS phishing (smishing), HelixStrike doesn’t rely on static URLs or predictable payloads. Instead, it employs a dynamic URL generation engine powered by a lightweight LLM (Large Language Model) running on compromised edge devices. This model, trained on terabytes of leaked chat logs, generates contextually relevant messages in Polish, German, and English—complete with local slang, emoji patterns, and even typos that mimic human behavior.

Once the victim clicks the link, the attack triggers a CVE-2026-2437 vulnerability in Android’s RCS stack, a memory corruption flaw in the com.android.mms.service component. The exploit bypasses ASLR (Address Space Layout Randomization) by abusing a race condition in the JNI (Java Native Interface) bridge, allowing arbitrary code execution with system-level privileges. What makes this particularly insidious is its zero-interaction requirement—no app installation or user confirmation is needed.

“This isn’t just another smishing campaign. HelixStrike represents a paradigm shift in how threat actors operationalize AI. We’re seeing the first instances of adaptive phishing, where the attack evolves in real-time based on the victim’s responses. The LLM backend doesn’t just generate messages—it conducts behavioral analysis, adjusting its tone, urgency, and even the payload based on how the victim engages.”

—Dr. Marek Kowalski, Chief Research Officer at CERT Polska, in an interview with CERT Polska

The AI Architecture Behind the Attack

Praetorian Guard’s Attack Helix framework, initially designed for red-team operations, appears to have been repurposed for HelixStrike. The architecture consists of three core components:

  • Persona Engine: A fine-tuned 7B-parameter LLM (likely a distilled version of Mistral or Llama 3) that generates human-like SMS content. The model was trained on a dataset of 1.2 million SMS conversations scraped from dark web forums, with additional synthetic data generated via GANs (Generative Adversarial Networks) to fill linguistic gaps.
  • Context Router: A reinforcement learning agent that dynamically selects the most effective attack vector based on the victim’s metadata (e.g., device model, carrier, time of day). For example, users on older Android versions (pre-12) are served a different exploit path than those on newer devices.
  • Payload Orchestrator: A modular C2 (Command and Control) framework that delivers stage-two payloads (e.g., spyware, ransomware) via WebRTC data channels to evade network-based detection.

What’s alarming is the self-improving nature of the system. The LLM backend logs every interaction, using reinforcement learning to refine its approach. In controlled tests, researchers found that the attack’s success rate increased by 18% after just 72 hours of operation, thanks to this feedback loop.

Why RCS Became the Perfect Attack Vector

RCS, Google’s successor to SMS, was designed to bring iMessage-like features to Android. However, its complex protocol stack—combining SIP (Session Initiation Protocol), MSRP (Message Session Relay Protocol), and proprietary Google extensions—has created a massive attack surface. Unlike SMS, which is limited to 160 characters and plaintext, RCS supports:

Why RCS Became the Perfect Attack Vector
Google Users Messages
  • Rich media (images, videos, GIFs)
  • Read receipts and typing indicators
  • End-to-end encryption (in some implementations)
  • Group chats with up to 100 participants

This functionality requires a persistent connection to Google’s servers, which HelixStrike exploits to maintain a low-latency C2 channel. The attack doesn’t just send a malicious link—it establishes a two-way communication channel that can be used to exfiltrate data or deliver additional payloads.

Google’s response has been fragmented. While the company patched CVE-2026-2437 in its April security update, the fix only addresses the memory corruption flaw—not the underlying design issues in RCS. A Google spokesperson told The Register:

“We’re aware of reports of malicious RCS messages and have taken steps to mitigate the issue. Users should ensure they’re running the latest version of Android and consider disabling RCS if they’re concerned about security.”

This non-committal stance highlights a broader problem: RCS lacks a formal security audit. Unlike Signal or WhatsApp, which have undergone third-party cryptographic reviews, RCS’s encryption (when enabled) is proprietary and closed-source. This opacity makes it difficult for researchers to verify its security claims.

The Enterprise Blind Spot: Why IT Teams Are Unprepared

Most enterprise security tools are ill-equipped to handle HelixStrike for three reasons:

How to spot SMS text scams and stay safe
  1. Protocol Blindness: Traditional DLP (Data Loss Prevention) and EDR (Endpoint Detection and Response) solutions don’t inspect RCS traffic, as it’s often treated as “personal” communication rather than a corporate threat vector.
  2. AI Evasion: The dynamic nature of the attack—where each message is unique—renders signature-based detection useless. Behavioral AI tools like Darktrace or Vectra struggle to distinguish between legitimate RCS chats and malicious ones.
  3. BYOD Complexity: With 68% of employees using personal devices for work (per Gartner’s 2026 BYOD report), HelixStrike can bypass corporate firewalls by tunneling through RCS, which operates over standard cellular data or Wi-Fi.

Netskope’s AI-Powered Security Analytics team has been tracking HelixStrike since February, noting that the attack’s sophistication suggests state-level involvement. In a leaked internal memo obtained by BleepingComputer, Netskope’s Distinguished Engineer wrote:

“The level of operational security (OPSEC) here is unprecedented. The attackers are using steganographic techniques to hide C2 instructions in seemingly benign RCS attachments—like a JPEG’s EXIF data or a PDF’s metadata. We’ve also observed domain fronting via Google’s own CDN to mask the C2 infrastructure.”

Mitigation Strategies: What Users and Enterprises Can Do

For individual users:

  • Disable RCS: Proceed to Messages > Settings > Chat features and toggle off “Enable chat features.” This reverts to SMS/MMS, which lacks the exploit’s attack surface.
  • Use Signal or WhatsApp: These apps have undergone rigorous security audits and don’t rely on RCS’s complex protocol stack.
  • Block Unknown Senders: In the Messages app, enable Settings > Spam protection to filter suspicious messages.

For enterprises:

Action Tool/Method Effectiveness
RCS Traffic Inspection Zscaler Private Access, Netskope Next Gen SWG High (blocks C2 channels)
Endpoint Hardening Microsoft Defender for Endpoint, CrowdStrike Falcon Medium (stops payload execution)
AI-Powered Anomaly Detection Darktrace Antigena, Vectra Cognito Low (struggles with RCS’s encryption)
User Training KnowBe4, Proofpoint Security Awareness Variable (depends on engagement)

The Broader Implications: AI as a Force Multiplier for Cybercrime

HelixStrike is a harbinger of what Carnegie Mellon’s Agentic AI Analysis calls “the democratization of cyber warfare.” The attack’s AI components aren’t cutting-edge—they’re off-the-shelf. The LLM backend could be run on a single NVIDIA A100 GPU, and the reinforcement learning agent was likely trained using open-source frameworks like Ray RLlib.

The Broader Implications: AI as a Force Multiplier for Cybercrime
Google Stay Safe Polska

This accessibility means we’re entering an era where script kiddies can deploy nation-state-level attacks. As Major Gabrielle Nesburg, a CMIST National Security Fellow, notes:

“The barrier to entry for cybercrime is collapsing. In 2020, launching a phishing campaign required a team of developers and a budget of six figures. Today, you can rent an AI-powered phishing-as-a-service platform for $500 a month. HelixStrike is just the beginning—we’re about to see a Cambrian explosion of AI-driven attacks.”

The economic incentives are staggering. According to IBM’s 2026 Cost of a Data Breach Report, the average cost of a credential theft incident is $4.87 million. With HelixStrike’s success rate hovering around 22% (per CERT Polska’s analysis), a single campaign targeting 100,000 users could yield over $100 million in illicit gains.

What’s Next: The Arms Race Between AI Defenders and Attackers

The cybersecurity industry is scrambling to respond. Microsoft’s AI Security team is reportedly developing a “Copilot for Threat Detection” that uses multimodal LLMs to analyze RCS traffic in real-time. Meanwhile, Google’s Project Zero has already flagged two additional RCS vulnerabilities (CVE-2026-2438 and CVE-2026-2439) that could enable similar attacks.

But the cat-and-mouse game is far from over. As CrossIdentity’s analysis of elite hackers reveals, the most sophisticated attackers are adopting a strategy of strategic patience. They’re not rushing to exploit vulnerabilities—they’re stockpiling them, waiting for the perfect moment to strike when defenses are weakest.

For now, the best defense is awareness. If you’ve received an unsolicited RCS message—especially one with a link or attachment—block the sender and report it. The era of “dumb” phishing is over. The messages you ignore today could be the ones that compromise your device tomorrow.

The 30-Second Verdict

  • What’s happening? A zero-day exploit in Android’s RCS protocol, powered by AI, is being used to deliver credential-stealing malware via SMS.
  • Why it matters: This is the first large-scale attack to weaponize real-time communication protocols with adaptive AI, marking a new frontier in cybercrime.
  • Who’s at risk? Any Android user with RCS enabled (over 1.2 billion devices globally). Enterprises are particularly vulnerable due to BYOD policies.
  • What to do: Disable RCS, use Signal/WhatsApp for sensitive conversations, and deploy RCS-aware security tools if you’re an enterprise.
  • What’s next? Expect more AI-driven attacks as the barrier to entry for cybercrime continues to drop. The arms race between attackers and defenders is entering a new phase.
Photo of author

Sophie Lin - Technology Editor

Sophie is a tech innovator and acclaimed tech writer recognized by the Online News Association. She translates the fast-paced world of technology, AI, and digital trends into compelling stories for readers of all backgrounds.

Beijing Cross-Border Travel Surges 13% in 2026 with Over 7 Million Border Crossings

"Murat Boz’s Heartfelt Song for Gülistan Doku: Lyrics, Release & Charity Donation"

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.