Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

Posted on November 12, 2025November 12, 2025 By CWS

Nov 12, 2025Ravie LakshmananCybercrime / Malware
Google has filed a civil lawsuit within the U.S. District Court docket for the Southern District of New York (SDNY) in opposition to China-based hackers who’re behind a large Phishing-as-a-Service (PhaaS) platform referred to as Lighthouse that has ensnared over 1 million customers throughout 120 international locations.
The PhaaS equipment is used to conduct large-scale SMS phishing assaults that exploit trusted manufacturers like E-ZPass and USPS to steal individuals’s monetary data by prompting them to click on on a hyperlink utilizing lures associated to faux toll charges or bundle deliveries. Whereas the rip-off in itself is pretty easy, it is the economic scale of the operation that has allowed it to illegally make greater than a billion {dollars} over the previous three years.
“They exploit the reputations of Google and different manufacturers by illegally displaying our emblems and companies on fraudulent web sites,” Halimah DeLaine Prado, Common Counsel at Google, stated. “We discovered not less than 107 web site templates that includes Google’s branding on sign-in screens particularly designed to trick individuals into believing the websites are authentic.”

The corporate stated it is taking authorized motion to dismantle the underlying infrastructure below the Racketeer Influenced and Corrupt Organizations (RICO) Act, the Lanham Act, and the Pc Fraud and Abuse Act.
Lighthouse, together with different PhaaS platforms like Darcula and Lucid, is a part of an interconnected cybercrime ecosystem working out of China that’s recognized to ship 1000’s of smishing messages through Apple iMessage and Google Messages’ RCS capabilities to customers within the U.S. and past in hopes of stealing delicate knowledge. These kits have been put to make use of by a smishing syndicate tracked as Smishing Triad.
In a report printed in September, Netcraft revealed that Lighthouse and Lucid have been linked to greater than 17,500 phishing domains focusing on 316 manufacturers from 74 international locations. Phishing templates related to Lighthouse are licensed from wherever between $88 for per week to $1,588 for a yearly subscription.
“Whereas Lighthouse operates independently of the XinXin group, its alignment with Lucid by way of infrastructure and focusing on patterns highlights the broader pattern of collaboration and innovation inside the PhaaS ecosystem,” Swiss cybersecurity firm PRODAFT stated in a report printed in April.

It is estimated that Chinese language smishing syndicates might have compromised between 12.7 million and 115 million fee playing cards within the U.S. alone between July 2023 and October 2024. In recent times, cybercrime teams from China have additionally advanced to develop new instruments like Ghost Faucet so as to add stolen card particulars to digital wallets on iPhones and Android telephones.
As not too long ago as final month, Palo Alto Networks Unit 42 stated the menace actors behind Smishing Triad have used greater than 194,000 malicious domains since January 1, 2024, mimicking a variety of companies, together with banks, cryptocurrency exchanges, mail and supply companies, police forces, state-owned enterprises, and digital tolls, amongst others.

The Hacker News Tags:Billion, ChinaBased, Google, Hackers, Lighthouse, Phishing, Platform, Sues

Post navigation

Previous Post: How TTP-based Defenses Outperform Traditional IoC Hunting
Next Post: China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

Related Posts

Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment The Hacker News
The Evolution of UTA0388’s Espionage Malware The Hacker News
Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers The Hacker News
Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails The Hacker News
Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News