Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries

Posted on September 22, 2025September 22, 2025 By CWS

The cybersecurity panorama faces a rising risk from refined Phishing-as-a-Service (PhaaS) platforms which might be democratizing cybercrime by decreasing technical limitations for fraudsters worldwide.

Amongst these rising threats, the Lucid PhaaS platform has established itself as a formidable pressure within the underground economic system, enabling massive-scale phishing operations throughout a number of continents and trade sectors.

Safety researchers have uncovered an in depth prison infrastructure centered round Lucid PhaaS, which has efficiently deployed over 17,500 phishing domains focusing on 316 distinguished manufacturers spanning 74 nations.

This scale represents one of many largest documented PhaaS operations so far, demonstrating the platform’s refined capabilities and widespread adoption amongst cybercriminals.

Lucid Phishing-as-a-Service website impersonating finance firm Kuda (Supply – Netcraft)

The operation encompasses numerous industries together with monetary establishments, authorities businesses, postal companies, and toll corporations, indicating the platform’s versatility in mimicking varied organizational constructions and model identities.

The marketing campaign’s geographical attain extends from main monetary facilities in North America and Europe to rising markets throughout Asia, Africa, and Latin America, suggesting a coordinated world operation reasonably than remoted regional actions.

Netcraft analysts recognized the malware by means of superior fingerprinting strategies and correlation evaluation that linked Lucid to its companion platform, Lighthouse PhaaS, by means of shared anti-monitoring infrastructure and equivalent template methods.

The investigation revealed that Lucid operates by means of a subscription-based mannequin the place cybercriminals pay month-to-month charges for entry to pre-configured phishing templates and internet hosting infrastructure.

Every phishing template throughout the platform receives a singular identifier, such because the “kuda295” theme found throughout evaluation of a monetary establishment impersonation marketing campaign.

This naming conference permits operators to effectively handle a number of concurrent campaigns whereas sustaining operational safety.

Superior Evasion and Anti-Monitoring Mechanisms

Lucid PhaaS employs refined detection evasion strategies that signify a major evolution in phishing expertise.

The platform implements a multi-layered filtering system that protects malicious content material from safety researchers and automatic detection methods by means of a number of technical mechanisms.

The first evasion approach requires guests to entry particular URL paths, reminiscent of “/servicios,” that are dynamically configured by fraudsters and differ considerably throughout campaigns focusing on equivalent manufacturers.

This path-based filtering makes automated detection difficult, as safety methods can not predict the required entry patterns.

Moreover, the platform enforces geographical restrictions by requiring connections from particular proxy nations, successfully limiting publicity to safety researchers working from identified evaluation facilities.

Consumer-Agent filtering represents one other vital evasion layer, with Lucid requiring cellular system signatures to show phishing content material.

This restriction aligns with the platform’s focusing on technique, as cellular customers typically exhibit decreased safety consciousness and function on gadgets with restricted safety tooling.

When guests fail to satisfy these standards, Lucid shows convincing faux e-commerce storefronts that includes merchandise like footwear or ladies’s clothes, full with skilled layouts and product catalogs.

These anti-monitoring pages serve a twin objective by sustaining the phantasm of reputable commerce whereas concealing the underlying prison infrastructure.

Safety researchers analyzing suspicious domains encounter apparently benign buying web sites, probably inflicting them to categorise the domains as false positives.

This deception approach considerably extends the operational lifespan of malicious domains and reduces the chance of profitable takedown efforts.

Sake storefronts (Supply – Netcraft)

The subtle faux storefronts demonstrating the platform’s consideration to visible authenticity and person expertise design, making detection more and more difficult for each automated methods and human analysts.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Brands, Countries, Domains, Lucid, Mimics, PhaaS, Phishing

Post navigation

Previous Post: Top 10 Best Autonomous Endpoint Management Tools in 2025
Next Post: Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations

Related Posts

Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code Cyber Security News
New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials Cyber Security News
North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
  • Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
  • Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
  • ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks
  • Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch
  • Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments
  • Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials
  • ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks
  • Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News