Google files lawsuit to disrupt massive ‘Lighthouse’ smishing scheme

Google filed a lawsuit on Wednesday in the Southern District of New York to disrupt a Chinese cybercriminal organization behind a pervasive phishing-as-a-service operation that has targeted millions of people around the world. 

According to the tech giant, the accused criminals developed the “Lighthouse” phishing kit, which provides custom tools to scammers to deploy “smishing” — or SMS phishing — attacks and to build fraudulent websites designed to steal victims’ credit card information. 

Lighthouse is connected to the ubiquitous SMS scams claiming, for example, that a package from the U.S. Postal Service is stuck in transit, or that a toll fee has not been paid. The kit’s operators are connected to the loosely-knit group of cybercriminals security researchers have dubbed “Smishing Triad.”

The operators allegedly sell Lighthouse kits for a monthly fee that includes website templates designed to mimic institutions. Over the course of a 20-day period, the lawsuit says, the software was used to create about 200,000 fake websites. The company alleges that between 12.7 million and 115 million credit cards in the U.S. have been compromised through the Lighthouse kits. More than 100 website templates were found to use Google branding on their sign-in pages.

Google said it does not know the names of the 25 defendants allegedly connected to the scheme. The company is seeking an injunction “to disrupt the criminal enterprise behind this scheme and stop its spread.” 

In a blog post announcing the lawsuit, the company said it is endorsing three pieces of legislation that have been introduced in the U.S. Congress to address scams launched from abroad, including the Scam Compound Accountability and Mobilization (SCAM) Act, which calls for a national strategy to counter transnational criminal groups carrying out sophisticated scam operations out of Southeast Asia.  

“We encourage Congress to enact these crucial bills and help bring a decisive end to the financial harm and damage wrought by foreign cybercriminals,” they said. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

‘Advanced’ hacker seen exploiting Cisco, Citrix zero-days

Next Post

US announces ‘strike force’ to counter Southeast Asian cyber scams, sanctions Myanmar armed group

Related Posts

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of
Read More

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. "This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service
Read More