Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
 Google Sues China-Based Hackers Behind  Billion Lighthouse Phishing Platform

 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

Posted on November 12, 2025November 12, 2025 By CWS

Nov 12, 2025Ravie LakshmananCybercrime / Malware
Google has filed a civil lawsuit within the U.S. District Court docket for the Southern District of New York (SDNY) in opposition to China-based hackers who’re behind a large Phishing-as-a-Service (PhaaS) platform referred to as Lighthouse that has ensnared over 1 million customers throughout 120 international locations.
The PhaaS equipment is used to conduct large-scale SMS phishing assaults that exploit trusted manufacturers like E-ZPass and USPS to steal individuals’s monetary data by prompting them to click on on a hyperlink utilizing lures associated to faux toll charges or bundle deliveries. Whereas the rip-off in itself is pretty easy, it is the economic scale of the operation that has allowed it to illegally make greater than a billion {dollars} over the previous three years.
“They exploit the reputations of Google and different manufacturers by illegally displaying our emblems and companies on fraudulent web sites,” Halimah DeLaine Prado, Common Counsel at Google, stated. “We discovered not less than 107 web site templates that includes Google’s branding on sign-in screens particularly designed to trick individuals into believing the websites are authentic.”

The corporate stated it is taking authorized motion to dismantle the underlying infrastructure below the Racketeer Influenced and Corrupt Organizations (RICO) Act, the Lanham Act, and the Pc Fraud and Abuse Act.
Lighthouse, together with different PhaaS platforms like Darcula and Lucid, is a part of an interconnected cybercrime ecosystem working out of China that’s recognized to ship 1000’s of smishing messages through Apple iMessage and Google Messages’ RCS capabilities to customers within the U.S. and past in hopes of stealing delicate knowledge. These kits have been put to make use of by a smishing syndicate tracked as Smishing Triad.
In a report printed in September, Netcraft revealed that Lighthouse and Lucid have been linked to greater than 17,500 phishing domains focusing on 316 manufacturers from 74 international locations. Phishing templates related to Lighthouse are licensed from wherever between $88 for per week to $1,588 for a yearly subscription.
“Whereas Lighthouse operates independently of the XinXin group, its alignment with Lucid by way of infrastructure and focusing on patterns highlights the broader pattern of collaboration and innovation inside the PhaaS ecosystem,” Swiss cybersecurity firm PRODAFT stated in a report printed in April.

It is estimated that Chinese language smishing syndicates might have compromised between 12.7 million and 115 million fee playing cards within the U.S. alone between July 2023 and October 2024. In recent times, cybercrime teams from China have additionally advanced to develop new instruments like Ghost Faucet so as to add stolen card particulars to digital wallets on iPhones and Android telephones.
As not too long ago as final month, Palo Alto Networks Unit 42 stated the menace actors behind Smishing Triad have used greater than 194,000 malicious domains since January 1, 2024, mimicking a variety of companies, together with banks, cryptocurrency exchanges, mail and supply companies, police forces, state-owned enterprises, and digital tolls, amongst others.

The Hacker News Tags:Billion, ChinaBased, Google, Hackers, Lighthouse, Phishing, Platform, Sues

Post navigation

Previous Post: How TTP-based Defenses Outperform Traditional IoC Hunting
Next Post: China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

Related Posts

Law Enforcement’s Use of Webloc for Global Device Tracking Law Enforcement’s Use of Webloc for Global Device Tracking The Hacker News
Why You Should Swap Passwords for Passphrases Why You Should Swap Passwords for Passphrases The Hacker News
FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available The Hacker News
U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN The Hacker News
Hackers Exploit Fake Resumes to Launch Crypto Miners Hackers Exploit Fake Resumes to Launch Crypto Miners The Hacker News
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark