Google Sues China-Based Cybercrime Ring, Backs New Anti-Scam Legislation

November 13, 2025
Google Sues China-Based Cybercrime Ring, Backs New Anti-Scam Legislation
  • Google has filed a landmark lawsuit against a China-based cybercrime group dubbed the Smishing Triad, accusing them of running a large-scale SMS phishing operation with Lighthouse to create fake websites and harvest data across 120 countries and more than a million victims.

  • Policy and legal strategy accompany the suit, as Google backs three bipartisan bills—the GUARD Act to empower retiree-targeted fraud investigations, the Foreign Robocall Elimination Act to form a taskforce against foreign robocalls, and the SCAM Act to craft a national anti-scam framework and sanctions.

  • A core tactic involves impersonating trusted brands, especially USPS, to coerce victims into paying for redelivery and other scams.

  • Experts say disrupting the major operators could deter future entrants, though cross-border challenges and extradition remain significant hurdles.

  • Industry observers note the Chinese phishing market is highly resilient and profitable; operators are likely to rebrand or relocate even if enforcement disrupts campaigns in the short term.

  • The reporting frame emphasizes cybercrime, enforcement actions, and implications for users and security practices.

  • The piece includes sponsored content and related tech podcasts, indicating a broader tech-news roundup context.

  • The action blends legal action with proactive policy work intended to deter scammers and prevent new entrants from joining the ecosystem.

  • This action is part of a broader trend of tech companies cracking down on Chinese cybercrime, alongside other investigations by Microsoft and telecoms and a DOJ indictment from early 2025.

  • Industry voices suggest breaking up major actors could have a wider deterrent effect across the phishing network.

  • Prado notes that the lawsuit’s aim is deterrence, not direct victim compensation.

  • Lawsuits help gather data and evidence to identify defendants, enabling wider investigations and takedowns even when suspects are initially unknown.

Summary based on 30 sources


Get a daily email with more Tech stories

More Stories