London Underground Commuters Targeted by Sophisticated SMS Blaster Scam
Four fraudsters have been sentenced for their roles in an elaborate scheme that used homemade "SMS blasters" concealed inside suitcases to target London Underground passengers with deceptive text messages. The devices, wheeled around the Tube network, sent thousands of fraudulent messages designed to plunder bank accounts through sophisticated phishing techniques.
Gift Card Laundering Operation Uncovered
Inner London Crown Court heard that the fraudsters laundered approximately £600,000 through gift cards purchased with stolen bank details. Gatis Lauks, 25, who admitted to fraud by false representation, was specifically identified as having processed this substantial amount through the purchasing of gift cards, receiving a 5% commission for his laundering activities.
Prosecutor Alex Davidson revealed that Lauks believed he personally made about £30,000 from the criminal enterprise. The defendant explained he could purchase up to 100 gift cards daily, with one transaction alone involving £8,000 worth of gift cards from a single UK retailer.
How the Scam OperatedThe fraudsters used suitcases containing modified electronic equipment to broadcast text messages to nearby mobile phones as they traveled through London's Underground system. Passengers who walked past these devices received messages claiming failed parcel deliveries, complete with links inviting them to input personal details to resolve the supposed issue.
"The aim was really to plunder their bank accounts," the court was told. Although authorities found it difficult to quantify the exact amount stolen specifically through the texting scheme, evidence showed that ringleader Zhijia Fan, 48, personally benefited by more than £100,000 from the criminal operation.
International Dimensions and Failed Expansion
The court heard intriguing details about the scheme's potential expansion beyond UK borders. Lauks was sent to France to assess the feasibility of conducting similar operations on the Paris Metro system. However, this international expansion was ultimately rejected because France "did not have the same vulnerabilities as could be exploited by the crime group in England."
Prosecutors described how Lauks received "real-time remote technical support" from a "lady in China" who assisted with the technical aspects of the operation. The defendant used a mobile application loaded with stolen bank details to make in-store purchases of gift cards, which were then used to acquire various luxury items including clothing, Pokemon cards, Louis Vuitton goods, and video games.
Police Investigation and Arrests
The sophisticated fraud was uncovered on March 11, 2025, when an off-duty British Transport Police detective noticed suspicious activity at King's Cross Underground station. The officer observed a man with a suitcase containing holes that emitted a green flash, prompting a comprehensive investigation.
Subsequent searches of the defendants' London addresses resulted in the seizure of 10,832 gift cards loaded with more than £80,000 in fraudulently obtained profits. The investigation drew on specialists from multiple agencies and involved close collaboration with major mobile network operators including BT, Virgin Media, O2, Vodafone-Three, and Sky, as well as the National Cyber Security Centre and Ofcom.
Sentencing and Consequences
At Tuesday's sentencing hearing, the four defendants received varying prison terms for their participation in what the judge described as an "extremely sophisticated fraud" in which all had been "knowing participants."
Zhijia Fan, identified as the "top boss" of the operation, received four years and eight months imprisonment. Daoyan Shang, 20, was sentenced to two years and ten months. Wan Hafiz, 41, received 14 months for conspiracy to defraud with an additional 10 weeks for possession of articles for use in fraud, with both sentences to run concurrently. Recorder Alex Stein noted that Hafiz would face deportation proceedings as he is not a British national.
Gatis Lauks received a two-year suspended sentence for his cooperation with authorities, having confessed to his role in the fraud five days after initially giving a "no comment" interview to police. The court heard that another suspect, Jinhua Zhang, 58, remains at large after fleeing while on bail.
Detective Inspector Tim Weekes of the British Transport Police commented after the sentencing: "These organised scammers concealed SMS blasters in suitcases in a bid to plunder the bank accounts of unsuspecting commuters. Their plot to defraud passengers was foiled by one of our vigilant detectives."
The judge emphasized that "tens of thousands" of smishing messages had been sent through the scheme, noting that "each one represents either an attempted offence or a completed offence" despite not all messages receiving responses from potential victims.
