An international law enforcement operation codenamed Operation Cyber-Surge has resulted in the complete takedown of LabHost, one of the world's largest and most sophisticated Phishing-as-a-Service (PhaaS) platforms. The operation, led by Europol and involving police forces from 19 countries, culminated in 37 arrests, including the platform's developer, and the seizure of its domains and infrastructure. LabHost operated on a subscription model, providing cybercriminals with high-quality phishing kits and a real-time management tool called LabRat to defeat 2FA. The platform is estimated to have enabled over 40,000 phishing attacks and had a subscriber base of over 2,000 criminals. The takedown represents a major victory for law enforcement against the cybercrime-as-a-service economy.
LabHost was a premier PhaaS provider, offering a turnkey solution for cybercriminals. For a monthly subscription (starting at $179), users received:
The takedown of LabHost is a significant disruption to the phishing ecosystem. It removes a major enabler that allowed low-skilled criminals to launch sophisticated attacks. By seizing the platform's servers, law enforcement has gained a treasure trove of data on the criminals who subscribed to the service, which will likely lead to further arrests. The operation also sends a strong message to operators and users of other crime-as-a-service platforms that they are not anonymous and can be brought to justice. While other PhaaS platforms will undoubtedly try to fill the void, the technical expertise and user base of LabHost will be difficult to replicate quickly.
While LabHost is gone, the threat of phishing remains. The techniques it enabled are still in use.
Training users to identify phishing attempts and to be skeptical of unsolicited requests is a fundamental defense.
The existence of tools like LabRat proves the need for phishing-resistant MFA (FIDO2) over more easily intercepted methods like SMS or TOTP.
Mapped D3FEND Techniques:
Web filtering solutions that block access to newly registered or known malicious domains can prevent users from reaching phishing pages.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats