Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit

Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit

Posted on November 12, 2025November 12, 2025 By CWS

Google on Tuesday introduced that it has filed a lawsuit towards a cybercrime group believed to be working out of China.

The group, often known as Smishing Triad, has been lively since a minimum of 2023, concentrating on customers around the globe in large-scale SMS phishing (smishing) campaigns. 

The group’s malicious SMS messages impersonate toll and package deal supply providers — Google supplied E-ZPass and USPS for example — in addition to banks, healthcare organizations, on-line cost platforms, regulation enforcement, and social media providers.

Google has focused Lighthouse, a just lately launched phishing-as-a-service package that allows cybercriminals to ship out messages containing hyperlinks to phishing websites. The malicious websites are set as much as trick customers into handing over e mail credentials, banking particulars, and different delicate data. 

Based on Google, the Lighthouse package enabled the concentrating on of a couple of million customers throughout over 120 international locations, with an estimated 12 million to 115 million bank cards being stolen in america alone.

Palo Alto Networks reported just lately {that a} Smishing Triad marketing campaign concerned greater than 194,000 malicious domains.

Google mentioned it recognized over 100 phishing web site templates impersonating its model and providers.

“Our authorized motion is designed to dismantle the core infrastructure of this operation,” defined Halimah DeLaine Prado, common counsel at Google. “We’re bringing claims underneath the Racketeer Influenced and Corrupt Organizations Act, the Lanham Act, and the Pc Fraud and Abuse Act to close it down, defending customers and different manufacturers.”Commercial. Scroll to proceed studying.

Submitting lawsuits towards cybercriminals — even with out understanding their id — allows main tech firms to acquire court docket orders for seizing malicious domains. As well as, lawsuits permit the businesses to subpoena ISPs, registrars, and internet hosting suppliers to acquire IPs and different technical data related to the operation and the defendants, which might finally result in unmasking their true identities. 

Microsoft has additionally filed lawsuits in an effort to disrupt cybercrime operations. Latest examples embrace the ONNX and RaccoonO365 phishing providers.

Along with its lawsuit, Google says its battle towards scammers contains endorsing a number of bipartisan payments aimed toward cyber-enabled threats.

This contains the Guarding Unprotected Getting old Retirees from Deception (GUARD) Act, which might empower regulation enforcement to research fraud and scams aimed toward retirees; the International Robocall Elimination Act, calling for the creation of a taskforce targeted on blocking overseas robocalls; and the Rip-off Compound Accountability and Mobilization (SCAM) Act, which might develop a nationwide technique to counter rip-off compounds.

Associated: Lumma Stealer Malware Returns After Takedown Try

Associated: Archetyp Darkish Net Market Shut Down by Legislation Enforcement

Security Week News Tags:Chinese, Cybercriminals, Google, Kit, Lighthouse, Phishing, Sues

Post navigation

Previous Post: Microsoft Investigating Teams Issue that Disables Users from Opening Apps
Next Post: Sweet Security Raises $75 Million for Cloud and AI Security

Related Posts

Neon Cyber Emerges from Stealth, Shining a Light into the Browser Neon Cyber Emerges from Stealth, Shining a Light into the Browser Security Week News
ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets Security Week News
SesameOp Malware Abuses OpenAI API  SesameOp Malware Abuses OpenAI API  Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack Pennsylvania Attorney General Confirms Data Breach After Ransomware Attack Security Week News
Valarian Bags M Seed Capital for ‘Isolation-First’ Infrastructure Tech Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News