Categories: Cyber Security News

FBI Uncovers 42,000 Phishing Domains Tied to LabHost ‘Phishing-as-a-Service’ Operation

The Federal Bureau of Investigation (FBI) has published a comprehensive list of 42,000 phishing domains tied to the now-dismantled LabHost phishing-as-a-service (PhaaS) platform, marking a significant development in the fight against global cybercrime.

The disclosure, released via an FBI FLASH alert on April 29, 2025, aims to arm cybersecurity professionals and organizations with crucial indicators of compromise, helping to bolster defenses against ongoing and future phishing threats.

LabHost: A Major Cybercrime Facilitator

LabHost, operational from November 2021 until its takedown in April 2024, was one of the largest and most sophisticated PhaaS providers.

At its peak, the platform boasted around 10,000 users worldwide and enabled cybercriminals to impersonate over 200 legitimate organizations-including major banks, government agencies, postal services, and streaming platforms.

For a monthly fee ranging from $179 to $300, subscribers gained access to customized phishing kits, infrastructure support, and advanced features such as adversary-in-the-middle proxy attacks to bypass two-factor authentication (2FA), as well as SMS-based phishing (smishing) services.

The scale of LabHost’s operations was staggering. According to the FBI, the platform’s infrastructure stored over one million user credentials and nearly 500,000 compromised credit cards, fueling widespread financial theft, fraud, and money laundering.

Investigators estimate that more than a million individuals worldwide may have fallen victim to these attacks.

International Takedown and Ongoing Risks

LabHost was dismantled in April 2024 following a coordinated international law enforcement operation involving agencies from 19 countries.

The crackdown resulted in 70 searches and 37 arrests, including key operators in the United Kingdom.

The FBI obtained the list of phishing domains and their creation dates directly from LabHost’s backend servers during the operation.

While many of the disclosed domains may no longer be active, the FBI urges organizations to review historical network logs for connections to these domains and to consider blacklisting them to prevent potential future threats.

The Bureau emphasizes that the list provides valuable intelligence for identifying past breaches, improving phishing detection models, and understanding adversary tactics.

Organizations detecting suspicious activity linked to these domains are encouraged to report findings to their local FBI field office and to take immediate incident response actions.

This unprecedented disclosure underscores the evolving and commercialized nature of cybercrime, as well as the importance of global collaboration in disrupting criminal infrastructure and protecting digital assets.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post FBI Uncovers 42,000 Phishing Domains Tied to LabHost ‘Phishing-as-a-Service’ Operation appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Replaced Review

Between the ubiquitous virtual assistants cheerfully patronising us from almost every electronic device and the…

30 minutes ago

The Tiny Firebat AM02 Ryzen 5 6600H Mini PC Is a Complete Windows 11 System at Just $250

If you're a Windows user who's looking for a PC version of the Apple Mac…

1 hour ago

Agreement With Toll Road Operator

FORT WAYNE, Ind. (WOWO) — The state of Indiana has agreed to let the Indiana…

2 hours ago

Multiple Storm Rounds

FORT WAYNE, Ind. (WOWO) — Severe thunderstorms are expected to move across central Indiana in…

2 hours ago

Universal Pictures at CinemaCon 2026: Everything Revealed

Universal Pictures and Focus Features have taken the stage at CinemaCon. We're expecting new looks…

2 hours ago

Tax Day 2026: Democrats and Republicans battle over impact of new Trump tax cuts

Maritza Montejo, a Liberty Tax Service office manager, helps Aurora Hernandez, left, with her taxes…

3 hours ago

This website uses cookies.