WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) FBI FLASH: Phishing Domains Associated with LabHost PhaaS Platform Users
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) FBI FLASH: Phishing Domains Associated with LabHost PhaaS Platform Users

TLP:CLEAR

Author: April Zupan

Created: Thursday, May 1, 2025 - 13:14

Categories: Cybersecurity, Intelligence

Summary: The FBI has released a FLASH report to disseminate 42,000 phishing domains linked to the LabHost phishing-as-a-service (PhaaS) platform between November 2021 and April 2024. The FBI is releasing this information to maximize awareness and provide indicators of compromise that may be used for cyber defense purposes. 

Analyst Note: Prior to being disabled by law enforcement in April 2024, LabHost was one of the world’s largest PhaaS providers, offering a range of illicit services for approximately 10,000 users. LabHost provided numerous phishing services to their customers including, but not limited to infrastructure configuration/support, customized phishing pages, and stolen credential management. LabHost phishing domains were configured to impersonate over 200 trusted sites, including spoofed pages for banks, online streaming platforms, government agencies, postal services, and more. WaterISAC has previously reported on past incidents where threat actors targeted water and wastewater utilities in targeted phishing campaigns. 

The FBI obtained these 42,000 domain names and creation dates associated with LabHost from the backend server of the platform. FBI has not validated every domain name, and the list may contain typographical or similar errors from LabHost user input. The information is historical in nature, and the domains may not currently be malicious.

FBI recommends organizations that identify any activity related to these indicators of compromise within their networks act to mitigate or minimize the impact and prepare their environment for incident response.

Original Source: Access the full report below.

Related WaterISAC PIRs: 6, 6.1, 10, 12
 

Attached Files:

250429.pdf

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar