New ‘Lucid’ Phishing Platform Abuses iMessage, Android RCS to Slip Past Defenses

A sophisticated cybercrime service known as “Lucid” is exploiting vulnerabilities in Apple’s iMessage and Android’s Rich Communication Services (RCS), allowing cyberthieves to conduct large-scale phishing attacks with alarming success.  Operated by Chinese-speaking threat actors, this Phishing-as-a-Service (PhaaS) platform enables scammers to bypass traditional SMS-based security filters, making it one of the most effective phishing operations […]

Written By: Aminu Abdullahi
Mar 28, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A sophisticated cybercrime service known as “Lucid” is exploiting vulnerabilities in Apple’s iMessage and Android’s Rich Communication Services (RCS), allowing cyberthieves to conduct large-scale phishing attacks with alarming success. 

Operated by Chinese-speaking threat actors, this Phishing-as-a-Service (PhaaS) platform enables scammers to bypass traditional SMS-based security filters, making it one of the most effective phishing operations in recent years.

How Lucid turns security features against users

Typically, SMS-based phishing (or smishing) is countered by telecom providers who scan and block suspicious messages before they reach potential victims.

However, iMessage and RCS, which rely on internet-based communication rather than traditional cellular networks, offer end-to-end encryption, making it nearly impossible for providers to filter out malicious content. Lucid uses this encryption to send phishing links directly to victims’ devices, avoiding detection and increasing the likelihood of success.

Examples of scam campaigns delivered via iMessage and RCS. Image credit: Prodaft

Once a victim receives a message — often disguised as an urgent notification from postal services, tax agencies, or financial institutions — they are lured into clicking a link that leads to a fake website mimicking a legitimate organization. Lucid’s operators employ several advanced techniques to make their campaigns more effective, including:

  • Customizable phishing templates that replicate the branding of specific companies.
  • Geo-targeting to tailor attacks based on the victim’s location.
  • Time-limited, single-use URLs that prevent cybersecurity analysts from tracing phishing links after an attack is completed.
  • Automated mobile farms that deploy phishing messages at scale.

A global cyber threat

Research from cybersecurity firm Prodaft indicates that Lucid has targeted victims in 88 countries, impersonating 169 organizations — including national postal services, courier companies, retailers, and government agencies. The success rate of these attacks is reportedly around 5%, far higher than the average phishing campaign, which typically struggles to achieve a 2% conversion rate.

The group behind Lucid, known as “XinXin” or “Black Technology,” is also linked to other PhaaS platforms like Darcula and Lighthouse. These services provide cybercriminals with ready-made tools to launch phishing attacks, highlighting a growing trend in the underground cybercrime economy where phishing is becoming increasingly automated and scalable.

Since early March 2024, the FBI’s Internet Crime Complaint Center (IC3) has received over 2,000 complaints about fraudulent toll payment messages. The scam has affected individuals across various states, and cybercriminals have registered more than 10,000 domains to facilitate these attacks.

Researchers found a single phishing site collected 30 credit card numbers after 550 page visits in one week. The group behind Lucid claims to harvest over 100,000 credit card numbers daily — a figure that, even if exaggerated, represents a significant threat to global cybersecurity.

Protecting yourself

Individuals and organizations must exercise caution with unexpected messages, even those appearing to come from trusted sources. As attackers refine their tactics, awareness and proactive behavior remain the first line of defense.

Effective best practices include:

  • Stay alert: Question unexpected messages, even from familiar contacts.
  • Avoid risky clicks: Do not click on links or download attachments from unknown or unsolicited sources.
  • Verify independently: Use official websites or trusted phone numbers to confirm suspicious communication.
  • Be wary of urgency: Scammers often create a false sense of pressure — take a moment to think before acting.
  • Keep devices updated: Regularly install updates to operating systems and apps to patch security vulnerabilities.

These simple but effective steps can help protect personal information and prevent costly mistakes.

AA

Aminu Abdullahi is an experienced B2B technology and finance writer. He has written for various publications, including TechRepublic, eWEEK, Enterprise Networking Planet, eSecurity Planet, CIO Insight, Enterprise Storage Forum, IT Business Edge, Webopedia, Software Pundit, Geekflare and more.

Recommended for you...

From LinkedIn to Lies: What a Job Scam Looks Like Now

Job scams are on the rise, targeting remote workers and new grads. Learn how to spot red flags, protect your info, and avoid falling victim.

Aminu Abdullahi
May 21, 2025
Fake AI Video Tools Spreading New “Noodlophile” Malware, Targets Thousands on Facebook

IT executive updating AI systems using green screen laptop, writing intricate binary code scripts. Technical support consultant using programming to

Aminu Abdullahi
May 12, 2025
RSA Conference 2025: Top Announcements and Key Takeaways from the Cybersecurity World’s Biggest Stage

Discover top RSA Conference 2025 highlights, from AI-powered security tools to identity protection, red teaming, mobile threats, and more.

NVIDIA: Agentic AI Is Reshaping Cybersecurity Defense

NVIDIA explores how agentic AI is transforming cybersecurity with real-time response, smarter automation, and new safeguards for secure deployment.

Aminu Abdullahi
Apr 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.