Phishing Kits & PhaaS
What Is Lucid PhaaS?
Lucid is a phishing-as-a-service (PhaaS) platform operated by the XinXin group, a Chinese-speaking cybercriminal collective, specializing in smishing (SMS phishing) attacks via Apple iMessage and Android RCS messaging protocols.
Lucid is a phishing-as-a-service (PhaaS) platform operated by the XinXin group, a Chinese-speaking cybercriminal collective, specializing in smishing (SMS phishing) attacks via Apple iMessage and Android RCS messaging protocols. The platform targets 169 organizations across 88 countries and claims capability to send 100,000 smishing messages daily via RCS or iMessage, according to The Hacker News reporting from April 2025. Sold through a dedicated Telegram channel with approximately 2,000 members on a weekly licensing model, according to Bleeping Computer's April 2025 analysis, Lucid represents one of the most sophisticated and highest-volume smishing platforms currently active. The platform maintains 129 active instances and over 1,000 registered phishing domains, according to Field Effect's December 2024 discovery report.
How does Lucid work?
Lucid exploits Apple iMessage and Android RCS messaging protocols using temporary Apple IDs and large-scale device farms. According to The Hacker News, the platform uses end-to-end encryption in both iMessage and RCS to bypass traditional carrier-level spam filtering. Messages sent through iMessage appear as trusted blue bubbles on iPhones, while RCS messages on Android include rich formatting capabilities that increase perceived legitimacy. The encryption prevents telecom carriers from inspecting message content for phishing indicators, a fundamental advantage over traditional SMS where carriers can implement content-based filtering.
The device farm infrastructure operates at scale with iOS and Android devices distributed across multiple locations. According to Bleeping Computer, these device farms enable the platform to achieve its claimed capacity of 100,000 messages daily while distributing sending across many devices to avoid detection and rate limiting. Temporary Apple IDs are created in bulk to send iMessage campaigns, exploiting the relatively minimal verification requirements for account creation.
The platform implements extensive anti-detection technologies to protect phishing pages from security researcher analysis. According to The Hacker News, victim profiling occurs before the phishing page loads, filtering targets based on IP geolocation, browser type and version, screen resolution, language settings, and device type (mobile versus desktop). Only victims matching predetermined profiles receive the actual phishing page; others may see error messages or blank pages. This fingerprinting prevents security researchers using emulators or non-target devices from analyzing the phishing content.
Time-limited single-use URLs expire after first access or a predetermined time window. According to Field Effect's analysis, header-based filtering blocks requests lacking expected HTTP headers characteristic of legitimate mobile browsers. User-agent filtering prevents automated scanning tools from accessing phishing pages by identifying and blocking tool signatures. Real-time device fingerprinting collects comprehensive information about victim devices including operating system, screen size, language preferences, and whether the access originates from mobile or desktop environments.
Lucid includes a built-in credit card validator tool that tests stolen cards for validity before storage. According to eSecurity Planet's analysis from April 2025, this enables real-time separation of valid cards (which can be sold to other criminals or used for fraud) from invalid or expired cards. Attackers can make immediate decisions about card utility rather than waiting to test cards through attempted transactions that might trigger fraud alerts.
The administrative panel provides real-time monitoring of victim interactions, enabling operators to view and verify submitted data as victims enter it. According to The Hacker News, customers granted weekly license keys receive access to the admin panel, pre-built or customizable phishing domains from the 1,000+ domain inventory, automated victim data validation, and credit card verification tools. The subscription model through Telegram provides access control while enabling operators to distribute licenses and collect payment, likely via cryptocurrency.
How does Lucid differ from other phishing platforms?
Feature | Lucid | Darcula | CoGUI |
|---|---|---|---|
Primary Delivery | iMessage/RCS | iMessage/RCS | |
Daily Message Capacity | 100,000 (claimed) | Not specified | 100M+ emails/month |
Active Infrastructure | 129 platform instances | Not specified | Not specified |
Domain Inventory | 1,000+ | 20,000+ | Multiple domains |
Customer Base | 2,000 Telegram members | 600+ operators | Telegram-based |
Subscription Model | Weekly licensing | Per-operator | Not specified |
Device Farms | Yes (iOS/Android) | Not documented | Not documented |
Credit Card Validator | Yes (built-in) | Not documented | Not specified |
AI Integration | Not documented | GenAI (April 2025) | Not documented |
Target Organizations | 169 in 88 countries | 100+ countries | 169 targets, Japan focus |
Documented Success Rate | ~5% | Not specified | Not specified |
Operator Group | XinXin group (China) | Yucheng C. (China) | Chinese-speaking |
Geographic Fingerprinting | Yes (IP/device profiling) | Limited | Yes (IP/browser/OS) |
Operational Status | Active (April 2025) | Active (April 2025) | Active (2025) |
Ideal for | High-volume smishing campaigns targeting mobile users | Multi-platform phishing with GenAI content | Geographic-specific targeting in Asian markets |
Lucid's primary distinguishing features include its device farm infrastructure for message distribution, weekly licensing business model, and integrated credit card validation tool. According to The Hacker News, the 5% documented success rate—meaning approximately 1 in 20 targeted recipients click and enter credentials—is relatively high for smishing campaigns compared to typical 1-3% email phishing click rates. At 100,000 messages daily with 5% conversion, the platform could facilitate approximately 5,000 credential captures per day per active subscriber.
Why does Lucid matter?
Lucid demonstrates the maturation of smishing-as-a-service offerings with industrial-scale infrastructure supporting distributed attacks. The 129 active platform instances and 1,000+ domain inventory, according to Field Effect, represent significant operational investment suggesting substantial revenue and market demand. The weekly licensing model indicates rapid customer acquisition and turnover, with the 2,000-member Telegram channel providing continuous distribution and customer service.
The device farm infrastructure represents a qualitative shift in smishing capability. According to Bleeping Computer, traditional SMS phishing campaigns face rate limits and carrier blocking that constrain message volume. By operating large-scale iOS and Android device farms, Lucid bypasses these constraints and achieves claimed daily capacity of 100,000 messages while distributing sending patterns across many devices to avoid detection. This infrastructure investment suggests sophisticated technical capability and financial resources beyond individual attackers or small groups.
The platform's targeting of 169 organizations across 88 countries demonstrates global reach and diverse vertical focus. According to The Hacker News, targets span financial services, technology companies, retail organizations, and government agencies. This broad targeting creates risk for organizations across industries and geographies, as the weekly licensing model enables rapid deployment against new targets as subscriber interests shift.
The built-in credit card validation tool fundamentally changes the economics of credential theft. According to eSecurity Planet, attackers can verify card validity immediately rather than discovering cards are expired or invalid only after attempting fraudulent transactions that might trigger detection. This real-time validation enables rapid monetization through dark web sales, where verified valid cards command premium prices over unverified credential dumps. The efficiency improvement increases the return on investment for subscribers and makes the platform more attractive relative to competitors.
The platform's operational resilience despite public disclosure indicates challenges in disrupting Chinese-operated PhaaS services. According to SC Media reporting from April 2025, Lucid continues operating openly through Telegram despite media coverage and security researcher analysis. The XinXin group's attribution creates jurisdictional challenges for Western law enforcement, similar to difficulties disrupting Darcula and other Chinese platforms. Unlike LabHost, which was disrupted through international coordination in April 2024, Chinese-based platforms continue operating, suggesting either insufficient international cooperation or deliberate tolerance by Chinese authorities.
What are the limitations of Lucid?
Device Farm Operations Create Detectable Signatures
Operating iOS and Android device farms at scale generates identifiable network patterns and behavioral signatures. According to The Hacker News, device farms require physical infrastructure, power, network connectivity, and management systems that create observable footprints. Security researchers and telecom carriers can identify anomalous message sending patterns characteristic of automated device farm operations, including message volume spikes, sending time patterns, and geographic concentration of messages from devices in the same physical location. Apple and Google can implement enhanced account creation monitoring to detect bulk temporary account creation patterns characteristic of Lucid's operational model.
Domain Concentration Enables Bulk Identification
The 1,000+ domain inventory creates identifiable DNS query patterns and SSL certificate clustering. According to SC Media, these domains likely share common registration patterns, hosting providers, certificate authorities, and DNS configurations that enable security researchers to identify and catalog them systematically. Once identified, domains can be distributed through threat intelligence feeds and blocked across email gateways, web proxies, and DNS security solutions. The finite domain inventory means intensive blocking efforts can significantly degrade the platform's effectiveness until new domains are registered, creating an operational cost for the XinXin group.
Telegram-Based Distribution Provides Law Enforcement Access
The centralized Telegram channel for customer acquisition and license management represents a single point of disruption. According to Bleeping Computer, the 2,000-member channel creates opportunities for law enforcement infiltration or undercover operations to gather intelligence about subscribers, payment methods, and operational practices. Telegram can be compelled to provide channel member metadata to law enforcement in some jurisdictions, potentially exposing subscriber identities or payment transaction details. If the channel is taken down, customer acquisition and license distribution would be disrupted until alternative distribution channels are established.
RCS Provider Authentication Improvements Threaten Viability
Carriers are increasingly implementing stronger sender authentication for RCS messaging. According to industry developments, RFC 5322 compliance and STIR/SHAKEN extensions for RCS aim to verify sender identity similar to email authentication protocols. These technical improvements would undermine Lucid's current exploitation of weak RCS sender validation, according to Dark Reading analysis. As carriers deploy authentication technologies, the platform's RCS capabilities may become less effective, forcing operators to rely more heavily on iMessage or develop new exploitation techniques.
Payment Infrastructure Creates Transaction Trails
The weekly licensing subscription model requires payment infrastructure, likely cryptocurrency-based, that creates transaction trails. According to Recorded Future analysis, cryptocurrency transactions are increasingly traceable through blockchain analysis and cooperation with cryptocurrency exchanges. Law enforcement agencies have successfully traced cryptocurrency payments in previous PhaaS investigations, including the LabHost case where payment analysis contributed to operator identification. The recurring weekly payment model creates regular transaction patterns that might be more easily identified than one-time purchases.
How can organizations defend against Lucid-style attacks?
User Authentication and Awareness
Organizations should educate users that legitimate services will not request credentials or two-factor authentication codes via iMessage or RCS. According to Netcraft guidance, users should verify delivery notifications, account alerts, and password reset requests by logging directly into services through bookmarked URLs or official mobile applications rather than clicking links in messages. URL inspection requires careful domain name checking for exact matches, as Lucid deploys typosquatting domains that differ by subtle character substitutions.
Implement RCS sender name display verification on supported devices, comparing sender names against known organizational contacts. According to CISA guidance, message anomalies including unsolicited requests from known organizations, especially financial or payment services, should be treated as suspicious. Users accessing services through VPN or proxy connections may reduce the effectiveness of Lucid's geographic targeting, as changing apparent location makes device fingerprinting less reliable for determining whether to display phishing pages.
Mobile Device Management and Authentication Hardening
Organizations should deploy mobile device management (MDM) solutions to enforce strong device lock requirements, biometric authentication, restricted application installation (whitelist corporate apps only), and conditional access policies based on device health. According to The Hacker News, hardware security keys resistant to smishing provide the strongest protection, as they verify the domain of authentication requests and prevent credential submission to phishing sites even if users attempt to authenticate.
Conditional access policies should flag logins from new devices, verify device geolocation against expected patterns, and require additional authentication when anomalies are detected. According to eSecurity Planet, organizations should register for iMessage Business Connect to add verification badges to legitimate organizational messages, enabling recipients to distinguish authentic communications from spoofed attempts. Work with telecom providers to verify RCS sender authentication implementation and explore options for limiting which senders can deliver RCS messages to organizational phone numbers.
Financial Institution Transaction Monitoring
Financial institutions should implement real-time fraud scoring for anomalous card usage patterns, velocity checks to prevent rapid multi-transaction sequences, and geographic velocity analysis to flag transactions from impossible locations within implausible timeframes. According to Security Affairs, 3D Secure 2 (3DS2) enforcement for high-risk transactions adds authentication layers that prevent fraudulent use even when card numbers are compromised. Card validation monitoring should detect bulk card testing patterns, as Lucid's built-in validator generates characteristic testing sequences when verifying stolen credentials.
Rapid card replacement procedures minimize the window of vulnerability after compromise is detected. According to SC Media, financial institutions should monitor dark web marketplaces for sales of validated card data, as credentials verified through Lucid's validation tool typically move quickly to resale markets. Suspicious card testing patterns—multiple authorization attempts for small amounts, testing across multiple merchants rapidly—indicate potential use of Lucid-stolen credentials.
Carrier-Level and Industry Coordination
Telecom industry STIR/SHAKEN implementation provides standards for RCS sender verification similar to caller ID authentication for voice calls. According to industry guidance, carriers should implement provider-specific sender validation rules, monitor for patterns matching bulk message sending (100,000+ daily messages from coordinated device sets), and share threat intelligence with other carriers about identified malicious sender patterns. Bulk message detection systems can identify the volume signatures characteristic of Lucid's claimed capacity.
Organizations should subscribe to threat intelligence feeds tracking Lucid's 1,000+ phishing domains. According to Dark Reading, major carriers including Verizon, AT&T, and Vodafone participate in industry alert programs where information about smishing campaigns is shared for coordinated response. Report smishing attempts to the FBI Internet Crime Complaint Center (IC3), alert CISA and Europol to enable investigation, and law enforcement can work with Telegram to monitor or disrupt customer acquisition channels and license distribution.
FAQs
What is the XinXin group and why are they creating phishing platforms?
The XinXin group is a Chinese-speaking cybercriminal collective known for developing multiple PhaaS platforms including Lucid, and associated with other platforms like Darcula and Lighthouse, according to Field Effect's December 2024 analysis. They create and license these platforms to other threat actors as a business model, generating subscription revenue while remaining somewhat insulated from individual campaign liability. By operating as platform providers rather than conducting phishing campaigns directly, the group attempts to create legal distance from specific fraud incidents while monetizing the tools and infrastructure. The group likely operates from China where jurisdictional challenges and extradition complexities complicate law enforcement response.
How is Lucid different from standard SMS phishing?
Lucid uses iMessage and RCS instead of traditional SMS, exploiting fundamental differences in these protocols. According to Bleeping Computer's analysis, iMessage and RCS are end-to-end encrypted, preventing carriers from inspecting message content for phishing indicators as they can with SMS. The visual trust signals—particularly iMessage's blue bubbles on iPhones—create psychological legitimacy that SMS lacks. Lucid operates device farms at scale enabling 100,000 daily messages distributed across many devices to avoid rate limiting and carrier blocking that constrain SMS campaigns. The platform implements sophisticated device fingerprinting and real-time card validation distinguishing it from typical SMS phishing.
What does Lucid's "5% success rate" mean and is that high?
A 5% success rate means approximately 1 in 20 targets who receive a Lucid phishing message actually click the link and enter credentials, according to analysis by The Hacker News. For context, typical email phishing campaigns achieve 1-3% click rates according to industry benchmarks, making 5% relatively high and indicating effective targeting and convincing message content. At Lucid's claimed capacity of 100,000 messages per day, a 5% success rate would yield approximately 5,000 credential captures daily per active subscriber. The higher-than-typical conversion rate suggests that iMessage and RCS exploitation effectively leverages trust signals.
Who runs Lucid and can it be shut down?
Lucid is run by the XinXin group, a Chinese-speaking cybercriminal collective, according to Field Effect's analysis. Law enforcement has successfully taken down some PhaaS platforms, most notably LabHost in April 2024 through international coordination involving 19 countries, but Lucid continues operating as of April 2025. Disruption requires international cooperation, carrier and platform provider coordination, and operational security failures by the operator group. The Chinese operational base creates jurisdictional challenges for Western law enforcement seeking to disrupt infrastructure or prosecute operators. Potential disruption pathways include Telegram takedown of the distribution channel and Apple and Google implementing stronger account creation controls.
If I think I fell for a Lucid phishing attack, what should I do?
Take immediate action from a clean device that was not involved in the phishing incident. According to CISA guidance, change passwords for all critical accounts including email, banking, work accounts, and any services using the same or similar passwords. Enable two-factor authentication using hardware security keys if possible, as these are resistant to phishing unlike SMS or app-based codes that can be intercepted. Contact your financial institutions immediately to report potential fraud, request new card numbers, and monitor all financial accounts daily for unauthorized transactions. File a report with the FBI Internet Crime Complaint Center (IC3) at ic3.gov.



