Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries

Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries

Posted on September 22, 2025September 22, 2025 By CWS

The cybersecurity panorama faces a rising risk from refined Phishing-as-a-Service (PhaaS) platforms which might be democratizing cybercrime by decreasing technical limitations for fraudsters worldwide.

Amongst these rising threats, the Lucid PhaaS platform has established itself as a formidable pressure within the underground economic system, enabling massive-scale phishing operations throughout a number of continents and trade sectors.

Safety researchers have uncovered an in depth prison infrastructure centered round Lucid PhaaS, which has efficiently deployed over 17,500 phishing domains focusing on 316 distinguished manufacturers spanning 74 nations.

This scale represents one of many largest documented PhaaS operations so far, demonstrating the platform’s refined capabilities and widespread adoption amongst cybercriminals.

Lucid Phishing-as-a-Service website impersonating finance firm Kuda (Supply – Netcraft)

The operation encompasses numerous industries together with monetary establishments, authorities businesses, postal companies, and toll corporations, indicating the platform’s versatility in mimicking varied organizational constructions and model identities.

The marketing campaign’s geographical attain extends from main monetary facilities in North America and Europe to rising markets throughout Asia, Africa, and Latin America, suggesting a coordinated world operation reasonably than remoted regional actions.

Netcraft analysts recognized the malware by means of superior fingerprinting strategies and correlation evaluation that linked Lucid to its companion platform, Lighthouse PhaaS, by means of shared anti-monitoring infrastructure and equivalent template methods.

The investigation revealed that Lucid operates by means of a subscription-based mannequin the place cybercriminals pay month-to-month charges for entry to pre-configured phishing templates and internet hosting infrastructure.

Every phishing template throughout the platform receives a singular identifier, such because the “kuda295” theme found throughout evaluation of a monetary establishment impersonation marketing campaign.

This naming conference permits operators to effectively handle a number of concurrent campaigns whereas sustaining operational safety.

Superior Evasion and Anti-Monitoring Mechanisms

Lucid PhaaS employs refined detection evasion strategies that signify a major evolution in phishing expertise.

The platform implements a multi-layered filtering system that protects malicious content material from safety researchers and automatic detection methods by means of a number of technical mechanisms.

The first evasion approach requires guests to entry particular URL paths, reminiscent of “/servicios,” that are dynamically configured by fraudsters and differ considerably throughout campaigns focusing on equivalent manufacturers.

This path-based filtering makes automated detection difficult, as safety methods can not predict the required entry patterns.

Moreover, the platform enforces geographical restrictions by requiring connections from particular proxy nations, successfully limiting publicity to safety researchers working from identified evaluation facilities.

Consumer-Agent filtering represents one other vital evasion layer, with Lucid requiring cellular system signatures to show phishing content material.

This restriction aligns with the platform’s focusing on technique, as cellular customers typically exhibit decreased safety consciousness and function on gadgets with restricted safety tooling.

When guests fail to satisfy these standards, Lucid shows convincing faux e-commerce storefronts that includes merchandise like footwear or ladies’s clothes, full with skilled layouts and product catalogs.

These anti-monitoring pages serve a twin objective by sustaining the phantasm of reputable commerce whereas concealing the underlying prison infrastructure.

Safety researchers analyzing suspicious domains encounter apparently benign buying web sites, probably inflicting them to categorise the domains as false positives.

This deception approach considerably extends the operational lifespan of malicious domains and reduces the chance of profitable takedown efforts.

Sake storefronts (Supply – Netcraft)

The subtle faux storefronts demonstrating the platform’s consideration to visible authenticity and person expertise design, making detection more and more difficult for each automated methods and human analysts.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Brands, Countries, Domains, Lucid, Mimics, PhaaS, Phishing

Post navigation

Previous Post: Top 10 Best Autonomous Endpoint Management Tools in 2025
Next Post: Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations

Related Posts

Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Cyber Security News
AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks Cyber Security News
Here’s How to Solve It  Here’s How to Solve It  Cyber Security News
New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems Cyber Security News
Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News