Original Article Text

Click to Toggle View

Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform. The Nigerian police arrested three individuals linked to targeted Microsoft 365 cyberattacks via Raccoon0365 phishing platform. The attacks led to business email compromise, data breaches, and financial losses affecting organizations worldwide. The law enforcement operation was possible thanks to intelligence from Microsoft, shared with the Nigeria Police Force National Cybercrime Centre (NPF–NCCC) via the FBI. The authorities identified individuals who administered the phishing toolkit ‘Raccoon0365,’ which automated the creation of fake Microsoft login pages for credential theft. The service, which was responsible for at least 5,000 Microsoft 365 account compromises across 94 countries, was disrupted by Microsoft and Cloudflare last September. It is unclear if the disruption operation helped identify those behind Raccoon0365 in Nigeria. BleepingComputer contacted Microsoft for clarifications but a comment wasn't immediately available. “Acting on precise and actionable intelligence, NPF–NCCC operatives were deployed to Lagos and Edo States, leading to the arrest of three suspects,” reads the police’s announcement. “Search operations conducted at their residences resulted in the recovery of laptops, mobile devices, and other digital equipment, which have been linked to the fraudulent scheme after forensic analysis.” One of the arrested suspects is an individual named Okitipi Samuel, also known online as “RaccoonO365” and “Moses Felix,” whom the police believe is the developer of the phishing platform. Samuel operated a Telegram channel where he sold phishing kits to other cybercriminals in exchange for cryptocurrency, while he also hosted the phishing pages on Cloudflare using accounts registered with compromised credentials. The Telegram channel counted over 800 members around the time of the disruption, and the reported access fees ranged from $355/month to $999/3 months. Cloudflare estimates that the service is used primarily by Russia-based cybercriminals. Regarding the other two arrested individuals, the police stated they have no evidence linking them to the Raccoon0365 operation or creation. The person that Microsoft previously identified as the leader of the phishing service, Joshua Ogundipe, is not mentioned in the police’s announcement. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Daily Brief Summary

CYBERCRIME // Nigerian Police Arrest Raccoon0365 Phishing Platform Developer

Nigerian authorities arrested three individuals connected to the Raccoon0365 phishing platform, responsible for Microsoft 365 cyberattacks leading to global financial losses and data breaches.

The arrests were facilitated by intelligence from Microsoft, shared through the FBI, enabling the Nigeria Police Force to target the operation effectively.

Raccoon0365 automated the creation of fraudulent Microsoft login pages, compromising at least 5,000 accounts across 94 countries, before its disruption by Microsoft and Cloudflare.

The primary suspect, Okitipi Samuel, allegedly developed the phishing platform and sold kits via a Telegram channel, accepting cryptocurrency as payment.

Forensic analysis of seized digital equipment linked the suspects to the phishing scheme, although two of the arrested individuals lacked direct evidence of involvement.

Cloudflare's analysis suggests the phishing service was predominantly used by cybercriminals based in Russia, indicating a broader international threat landscape.

The operation underscores the importance of international cooperation and intelligence sharing in combating cybercrime effectively.