An international law enforcement operation codenamed Operation Cyber-Surge has resulted in the complete takedown of LabHost, one of the world's largest and most sophisticated Phishing-as-a-Service (PhaaS) platforms. The operation, led by Europol and involving police forces from 19 countries, culminated in 37 arrests, including the platform's developer, and the seizure of its domains and infrastructure. LabHost operated on a subscription model, providing cybercriminals with high-quality phishing kits and a real-time management tool called LabRat to defeat 2FA. The platform is estimated to have enabled over 40,000 phishing attacks and had a subscriber base of over 2,000 criminals. The takedown represents a major victory for law enforcement against the cybercrime-as-a-service economy.
LabHost was a premier PhaaS provider, offering a turnkey solution for cybercriminals. For a monthly subscription (starting at $179), users received:
The takedown of LabHost is a significant disruption to the phishing ecosystem. It removes a major enabler that allowed low-skilled criminals to launch sophisticated attacks. By seizing the platform's servers, law enforcement has gained a treasure trove of data on the criminals who subscribed to the service, which will likely lead to further arrests. The operation also sends a strong message to operators and users of other crime-as-a-service platforms that they are not anonymous and can be brought to justice. While other PhaaS platforms will undoubtedly try to fill the void, the technical expertise and user base of LabHost will be difficult to replicate quickly.
While LabHost is gone, the threat of phishing remains. The techniques it enabled are still in use.
Training users to identify phishing attempts and to be skeptical of unsolicited requests is a fundamental defense.
The existence of tools like LabRat proves the need for phishing-resistant MFA (FIDO2) over more easily intercepted methods like SMS or TOTP.
Mapped D3FEND Techniques:
Web filtering solutions that block access to newly registered or known malicious domains can prevent users from reaching phishing pages.
Mapped D3FEND Techniques:
Europol announces the successful takedown of the LabHost platform and the arrest of 37 individuals.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.