Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Posted on November 13, 2025November 13, 2025 By CWS

Google safety researchers just lately uncovered a complicated legal operation referred to as “Lighthouse” that has victimized over a million individuals throughout greater than 120 international locations.

This phishing-as-a-service platform represents one of the vital damaging SMS-based rip-off networks lately, prompting Google to file litigation aimed toward dismantling all the operation.

The assault’s scale reveals how well-organized cybercriminals have turn out to be, deploying coordinated assaults that exploit trusted model names to trick victims into surrendering delicate data.

The Lighthouse platform allows attackers to launch large “smishing” campaigns, that are phishing assaults delivered by means of textual content messages relatively than e-mail.

Criminals utilizing this equipment ship misleading SMS messages pretending to come back from reputable firms like E-Z Move, USPS, and toll assortment providers.

These messages sometimes immediate recipients to click on hyperlinks that result in fraudulent web sites designed to steal credentials and monetary knowledge.

Google safety analysts recognized at the very least 107 web site templates that includes Google’s branding on sign-in screens particularly crafted to seem reputable.

These fraudulent web sites requested unsuspecting customers to enter e-mail addresses, passwords, banking credentials, and different delicate data.

The operation has stolen between 12.7 million and 115 million bank cards in the USA alone, representing a big monetary affect to victims.

Technical Infrastructure and Assault Mechanism

The Lighthouse platform operates as a whole legal service providing, offering unhealthy actors with readily-made phishing kits and infrastructure to execute assaults at scale.

The service simplifies the assault course of by permitting operators with minimal technical experience to launch convincing campaigns.

Criminals can customise templates for various goal manufacturers, handle sufferer databases, and harvest stolen credentials by means of a centralized command-and-control infrastructure.

Google’s authorized motion targets the operation beneath a number of legal guidelines, together with the Racketeer Influenced and Corrupt Organizations Act, the Lanham Act for trademark violations, and the Laptop Fraud and Abuse Act.

The corporate can be implementing defensive measures, together with AI-powered detection techniques to flag suspicious messages and expanded account restoration choices to assist compromised customers regain entry to their accounts extra safely.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Google, Kit, Lighthouse, Massive, Phishing, Phishingasaservice, Sues

Post navigation

Previous Post: ChatGPT Vulnerability Exposed Underlying Cloud Infrastructure
Next Post: New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 

Related Posts

NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems NightSpire Ransomware Group Claims to Exploit The Vulnerabilities of Orgs to Infiltrate Their Systems Cyber Security News
Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Cyber Security News
First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account Cyber Security News
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk Cyber Security News
Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access Cyber Security News
GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment GOLD BLADE Using Custom QWCrypt Locker that Allows Data Exfiltration and Ransomware Deployment Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 287 Chrome Extensions Breach Privacy of Millions
  • Managing Technical Debt in AI-Driven Software Development
  • NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord
  • Critical Flaw in WordPress Plugin Risks Site Security
  • Google Chrome Update: Critical Security Fixes Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 287 Chrome Extensions Breach Privacy of Millions
  • Managing Technical Debt in AI-Driven Software Development
  • NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord
  • Critical Flaw in WordPress Plugin Risks Site Security
  • Google Chrome Update: Critical Security Fixes Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark