Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries

Posted on September 22, 2025September 22, 2025 By CWS

The cybersecurity panorama faces a rising risk from refined Phishing-as-a-Service (PhaaS) platforms which might be democratizing cybercrime by decreasing technical limitations for fraudsters worldwide.

Amongst these rising threats, the Lucid PhaaS platform has established itself as a formidable pressure within the underground economic system, enabling massive-scale phishing operations throughout a number of continents and trade sectors.

Safety researchers have uncovered an in depth prison infrastructure centered round Lucid PhaaS, which has efficiently deployed over 17,500 phishing domains focusing on 316 distinguished manufacturers spanning 74 nations.

This scale represents one of many largest documented PhaaS operations so far, demonstrating the platform’s refined capabilities and widespread adoption amongst cybercriminals.

Lucid Phishing-as-a-Service website impersonating finance firm Kuda (Supply – Netcraft)

The operation encompasses numerous industries together with monetary establishments, authorities businesses, postal companies, and toll corporations, indicating the platform’s versatility in mimicking varied organizational constructions and model identities.

The marketing campaign’s geographical attain extends from main monetary facilities in North America and Europe to rising markets throughout Asia, Africa, and Latin America, suggesting a coordinated world operation reasonably than remoted regional actions.

Netcraft analysts recognized the malware by means of superior fingerprinting strategies and correlation evaluation that linked Lucid to its companion platform, Lighthouse PhaaS, by means of shared anti-monitoring infrastructure and equivalent template methods.

The investigation revealed that Lucid operates by means of a subscription-based mannequin the place cybercriminals pay month-to-month charges for entry to pre-configured phishing templates and internet hosting infrastructure.

Every phishing template throughout the platform receives a singular identifier, such because the “kuda295” theme found throughout evaluation of a monetary establishment impersonation marketing campaign.

This naming conference permits operators to effectively handle a number of concurrent campaigns whereas sustaining operational safety.

Superior Evasion and Anti-Monitoring Mechanisms

Lucid PhaaS employs refined detection evasion strategies that signify a major evolution in phishing expertise.

The platform implements a multi-layered filtering system that protects malicious content material from safety researchers and automatic detection methods by means of a number of technical mechanisms.

The first evasion approach requires guests to entry particular URL paths, reminiscent of “/servicios,” that are dynamically configured by fraudsters and differ considerably throughout campaigns focusing on equivalent manufacturers.

This path-based filtering makes automated detection difficult, as safety methods can not predict the required entry patterns.

Moreover, the platform enforces geographical restrictions by requiring connections from particular proxy nations, successfully limiting publicity to safety researchers working from identified evaluation facilities.

Consumer-Agent filtering represents one other vital evasion layer, with Lucid requiring cellular system signatures to show phishing content material.

This restriction aligns with the platform’s focusing on technique, as cellular customers typically exhibit decreased safety consciousness and function on gadgets with restricted safety tooling.

When guests fail to satisfy these standards, Lucid shows convincing faux e-commerce storefronts that includes merchandise like footwear or ladies’s clothes, full with skilled layouts and product catalogs.

These anti-monitoring pages serve a twin objective by sustaining the phantasm of reputable commerce whereas concealing the underlying prison infrastructure.

Safety researchers analyzing suspicious domains encounter apparently benign buying web sites, probably inflicting them to categorise the domains as false positives.

This deception approach considerably extends the operational lifespan of malicious domains and reduces the chance of profitable takedown efforts.

Sake storefronts (Supply – Netcraft)

The subtle faux storefronts demonstrating the platform’s consideration to visible authenticity and person expertise design, making detection more and more difficult for each automated methods and human analysts.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Brands, Countries, Domains, Lucid, Mimics, PhaaS, Phishing

Post navigation

Previous Post: Top 10 Best Autonomous Endpoint Management Tools in 2025
Next Post: Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations

Related Posts

Microsoft Fixes Long-standing Windows 11 ‘Update and Shut down’ Bug Cyber Security News
Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Cyber Security News
Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Cyber Security News
Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network Cyber Security News
Surge in Attacks Targeting RSC-Enabled Services Worldwide Cyber Security News
Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
  • SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
  • WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users
  • Ransomware Attack on Romanian Waters Authority
  • Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
  • SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
  • WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users
  • Ransomware Attack on Romanian Waters Authority
  • Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark