Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform

Posted on November 12, 2025November 12, 2025 By CWS

Nov 12, 2025Ravie LakshmananCybercrime / Malware
Google has filed a civil lawsuit within the U.S. District Court docket for the Southern District of New York (SDNY) in opposition to China-based hackers who’re behind a large Phishing-as-a-Service (PhaaS) platform referred to as Lighthouse that has ensnared over 1 million customers throughout 120 international locations.
The PhaaS equipment is used to conduct large-scale SMS phishing assaults that exploit trusted manufacturers like E-ZPass and USPS to steal individuals’s monetary data by prompting them to click on on a hyperlink utilizing lures associated to faux toll charges or bundle deliveries. Whereas the rip-off in itself is pretty easy, it is the economic scale of the operation that has allowed it to illegally make greater than a billion {dollars} over the previous three years.
“They exploit the reputations of Google and different manufacturers by illegally displaying our emblems and companies on fraudulent web sites,” Halimah DeLaine Prado, Common Counsel at Google, stated. “We discovered not less than 107 web site templates that includes Google’s branding on sign-in screens particularly designed to trick individuals into believing the websites are authentic.”

The corporate stated it is taking authorized motion to dismantle the underlying infrastructure below the Racketeer Influenced and Corrupt Organizations (RICO) Act, the Lanham Act, and the Pc Fraud and Abuse Act.
Lighthouse, together with different PhaaS platforms like Darcula and Lucid, is a part of an interconnected cybercrime ecosystem working out of China that’s recognized to ship 1000’s of smishing messages through Apple iMessage and Google Messages’ RCS capabilities to customers within the U.S. and past in hopes of stealing delicate knowledge. These kits have been put to make use of by a smishing syndicate tracked as Smishing Triad.
In a report printed in September, Netcraft revealed that Lighthouse and Lucid have been linked to greater than 17,500 phishing domains focusing on 316 manufacturers from 74 international locations. Phishing templates related to Lighthouse are licensed from wherever between $88 for per week to $1,588 for a yearly subscription.
“Whereas Lighthouse operates independently of the XinXin group, its alignment with Lucid by way of infrastructure and focusing on patterns highlights the broader pattern of collaboration and innovation inside the PhaaS ecosystem,” Swiss cybersecurity firm PRODAFT stated in a report printed in April.

It is estimated that Chinese language smishing syndicates might have compromised between 12.7 million and 115 million fee playing cards within the U.S. alone between July 2023 and October 2024. In recent times, cybercrime teams from China have additionally advanced to develop new instruments like Ghost Faucet so as to add stolen card particulars to digital wallets on iPhones and Android telephones.
As not too long ago as final month, Palo Alto Networks Unit 42 stated the menace actors behind Smishing Triad have used greater than 194,000 malicious domains since January 1, 2024, mimicking a variety of companies, together with banks, cryptocurrency exchanges, mail and supply companies, police forces, state-owned enterprises, and digital tolls, amongst others.

The Hacker News Tags:Billion, ChinaBased, Google, Hackers, Lighthouse, Phishing, Platform, Sues

Post navigation

Previous Post: How TTP-based Defenses Outperform Traditional IoC Hunting
Next Post: China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says

Related Posts

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild The Hacker News
Evolving Enterprise Defense to Secure the Modern AI Supply Chain The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms The Hacker News
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News