Google files lawsuit to disrupt massive ‘Lighthouse’ smishing scheme

Google filed a lawsuit on Wednesday in the Southern District of New York to disrupt a Chinese cybercriminal organization behind a pervasive phishing-as-a-service operation that has targeted millions of people around the world. 

According to the tech giant, the accused criminals developed the “Lighthouse” phishing kit, which provides custom tools to scammers to deploy “smishing” — or SMS phishing — attacks and to build fraudulent websites designed to steal victims’ credit card information. 

Lighthouse is connected to the ubiquitous SMS scams claiming, for example, that a package from the U.S. Postal Service is stuck in transit, or that a toll fee has not been paid. The kit’s operators are connected to the loosely-knit group of cybercriminals security researchers have dubbed “Smishing Triad.”

The operators allegedly sell Lighthouse kits for a monthly fee that includes website templates designed to mimic institutions. Over the course of a 20-day period, the lawsuit says, the software was used to create about 200,000 fake websites. The company alleges that between 12.7 million and 115 million credit cards in the U.S. have been compromised through the Lighthouse kits. More than 100 website templates were found to use Google branding on their sign-in pages.

Google said it does not know the names of the 25 defendants allegedly connected to the scheme. The company is seeking an injunction “to disrupt the criminal enterprise behind this scheme and stop its spread.” 

In a blog post announcing the lawsuit, the company said it is endorsing three pieces of legislation that have been introduced in the U.S. Congress to address scams launched from abroad, including the Scam Compound Accountability and Mobilization (SCAM) Act, which calls for a national strategy to counter transnational criminal groups carrying out sophisticated scam operations out of Southeast Asia.  

“We encourage Congress to enact these crucial bills and help bring a decisive end to the financial harm and damage wrought by foreign cybercriminals,” they said. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

‘Advanced’ hacker seen exploiting Cisco, Citrix zero-days

Next Post

US announces ‘strike force’ to counter Southeast Asian cyber scams, sanctions Myanmar armed group

Related Posts

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote IT workers tied to Lazarus Group’s Famous Chollima division. For the first time, researchers managed
Read More

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware
Read More

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard's STRIKE team. Southeast Asia and European countries are some of the other regions where infections have
Read More