Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge

Posted on September 19, 2025September 19, 2025 By CWS

The phishing-as-a-service (PhaaS) providing referred to as Lighthouse and Lucid has been linked to greater than 17,500 phishing domains concentrating on 316 manufacturers from 74 international locations.
“Phishing-as-a-Service (PhaaS) deployments have risen considerably just lately,” Netcraft stated in a brand new report. “The PhaaS operators cost a month-to-month charge for phishing software program with pre-installed templates impersonating, in some circumstances, tons of of manufacturers from international locations world wide.”
Lucid was first documented by Swiss cybersecurity firm PRODAFT earlier this April, detailing the phishing package’s potential to ship smishing messages by way of Apple iMessage and Wealthy Communication Companies (RCS) for Android.
The service is assessed to be the work of a Chinese language-speaking risk actor referred to as the XinXin group (changqixinyun), which has additionally leveraged different phishing kits like Lighthouse and Darcula in its operations. Darcula is developed by an actor named LARVA-246 (aka X667788X0 or xxhcvv), whereas Lighthouse’s improvement has been linked to LARVA-241 (aka Lao Wang or Wang Duo Yu).

The Lucid PhaaS platform permits clients to mount phishing campaigns at scale, concentrating on a variety of industries, together with toll firms, governments, postal firms, and monetary establishments.
These assaults additionally incorporate varied standards – resembling requiring a particular cell Person-Agent, proxy nation, or a fraudster-configured path – to make sure that solely the supposed targets can entry the phishing URLs. If a person apart from the goal finally ends up visiting the URL, they’re served a generic faux storefront as a substitute.
In all, Netcraft stated it has detected phishing URLs concentrating on 164 manufacturers based mostly in 63 completely different international locations hosted by means of the Lucid platform. Lighthouse phishing URLs have focused 204 manufacturers based mostly in 50 completely different international locations.
Lighthouse, like Lucid, gives template customization and real-time sufferer monitoring, and boasts the flexibility to create phishing templates for over 200 platforms internationally, indicating vital overlaps between the 2 PhaaS toolkits. Costs for Lighthouse vary from $88 for every week to $1,588 for a yearly subscription.
“Whereas Lighthouse operates independently of the XinXin group, its alignment with Lucid when it comes to infrastructure and concentrating on patterns highlights the broader development of collaboration and innovation throughout the PhaaS ecosystem,” PRODAFT famous again in April.

Phishing campaigns utilizing Lighthouse have used URLs impersonating the Albanian postal service Posta Shqiptare, whereas serving the identical faux purchasing website to non-targets, suggesting a possible hyperlink between Lucid and Lighthouse.
“Lucid and Lighthouse are examples of how briskly the expansion and evolution of those platforms can happen and the way tough they’ll typically be to disrupt,” Netcraft researcher Harry Everett stated.
The event comes because the London-based firm revealed that phishing assaults are transferring away from communication channels like Telegram to transit stolen knowledge, portray an image of a platform that is now not prone to be thought of a secure haven for cybercriminals.
As a substitute, risk actors are returning to e-mail as a channel for harvesting stolen credentials, with Netcraft seeing a 25% enhance in a span of a month. Cybercriminals have additionally been discovered to make use of companies like EmailJS to reap login particulars and two-factor authentication (2FA) codes from victims, eliminating the necessity for internet hosting their very own infrastructure altogether.
“This resurgence is partly as a result of federated nature of e-mail, which makes takedowns tougher,” safety researcher Penn Waterproof coat stated. “Every handle or SMTP relay should be reported individually, not like centralized platforms like Discord or Telegram. And it is also about comfort. Making a throwaway e-mail handle stays fast, nameless, and nearly free.”
The findings additionally observe the emergence of recent lookalike domains utilizing the Japanese Hiragana character “ん” to move off faux web site URLs as nearly an identical to their reputable ones in what’s known as a homoglyph assault. At least 600 bogus domains using this method have been recognized in assaults geared toward cryptocurrency customers, with the earliest recorded use relationship again to November 25, 2024.

These pages impersonate reputable browser extensions on the Chrome Net Retailer, deceiving unsuspecting customers into putting in faux pockets apps for Phantom, Rabby, OKX, Coinbase, MetaMask, Exodus, PancakeSwap, Bitget, and Belief which might be designed to seize system info or harvest seed phrases, giving the attackers full management over their wallets.
“At a fast look, it’s supposed to appear to be a ahead slash ‘/,'” Netcraft stated. “And when it is dropped into a site title, it is easy to see how it may be convincing. That tiny swap is sufficient to make a phishing website area look actual, which is the aim of risk actors making an attempt to steal logins and private info or distribute malware.”

In current months, scams have additionally exploited the model identities of American corporations like Delta Airways, AMC Theatres, Common Studios, and Epic Data to enroll individuals in schemes that supply a technique to earn cash by finishing a collection of duties, resembling working as a flight reserving agent.
The catch right here is that so as to take action, would-be victims are requested to deposit a minimum of $100 value of cryptocurrency to their accounts, permitting the risk actors to make illicit earnings.
The duty rip-off “illustrates how opportunistic actors are weaponizing API-driven brand-impersonation templates to scale financially motivated fraud throughout a number of verticals,” Netcraft researcher Rob Duncan stated.

The Hacker News Tags:Brands, Countries, Domains, Global, PhaaS, Phishing, Surge, Target

Post navigation

Previous Post: Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions
Next Post: SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers

Related Posts

The Costly Confusion Behind Security Risks The Hacker News
WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices The Hacker News
Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775 The Hacker News
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware The Hacker News
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers The Hacker News
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
  • CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware
  • In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias
  • SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
  • 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
  • CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware
  • In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias
  • SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
  • 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News