Article Details

Scrape Timestamp (UTC): 2025-12-24 15:16:13.529

Source: https://www.theregister.com/2025/12/24/us_shutters_phishermens_146m_passwordhording/

Original Article Text

Click to Toggle View

US shuts down phisherfolk’s $14.6M password-hoarding platform. Crooks used platform to scoop up and store banking credentials for big-money thefts. The US says it has shut down a platform used by cybercriminals to break into Americans' bank accounts. A law enforcement splash page now appears when trying to reach web3adspanels.org, which supported SEO poisoning campaigns designed to steal people's bank account credentials. Criminals would pay for prime slots in search engine results, serving users seemingly legitimate banking websites that were actually fakes. From there, unwitting users entered their passwords, which were dumped into a database, but they would never reach their account. The Justice Department described the role of web3adspanels.org as a platform on which criminals would store and manipulate these credentials, which they would then use in attempts to access bank accounts and authorize illegal transfers. According to the affidavit, the FBI is aware of at least 19 victims, including two companies, across the US that have succumbed to this specific scheme, which represents just a small operation in the wider account takeover problem. Prosecutors tied $28 million worth of attempted illegal transfers to web3adspanels, with the total of actual losses estimated at $14.6 million. However, law enforcement agencies have received more than 5,100 of these kinds of complaints since the start of the year, with total reported losses of more than $262 million, according to the FBI's Internet Crime Complaint Center (IC3). In making its announcement, the Justice Department did not offer details about how the criminals bypassed the more stringent security controls such as multi-factor authentiction (MFA) when illegally accessing the accounts. Nor did the IC3 when it released an advisory on the matter last month. The same campaigns are often conducted using social engineering tactics instead of basic phishing. Criminals convince victims into handing over their credentials and, crucially, their MFA or one-time passcodes to access their accounts. Once inside, the playbook typically sees the cybercrooks transferring funds to accounts they legitimately control, which then use the money to purchase cryptocurrencies, making it more difficult to track across different blockchains. Social engineers often also change the victims' bank account passwords, locking them out, the FBI said. Losses associated with e-crime have risen consistently since 2020, according to IC3 figures [PDF], with cyber-enabled fraud accounting for 83 percent of the total $16.6 billion in 2024.

Daily Brief Summary

CYBERCRIME // U.S. Dismantles $14.6M Cybercrime Platform Exploiting Banking Credentials

The U.S. Justice Department has shut down web3adspanels.org, a platform that facilitated the theft of banking credentials through SEO poisoning campaigns.

Criminals used the platform to create fake banking websites, tricking users into entering passwords that were stored for unauthorized access and fraudulent transfers.

At least 19 victims, including two companies, were identified, with $28 million in attempted illegal transfers and $14.6 million in actual losses tied to this scheme.

Law enforcement has received over 5,100 complaints related to similar account takeover tactics this year, with losses exceeding $262 million.

The FBI's Internet Crime Complaint Center noted a rise in cyber-enabled fraud, which accounted for 83% of the $16.6 billion in e-crime losses in 2024.

Social engineering tactics, including obtaining MFA codes, were employed to bypass security measures, allowing cybercriminals to transfer funds and purchase cryptocurrencies.

The Justice Department's announcement did not detail methods used to circumvent security controls, highlighting ongoing vulnerabilities in user authentication processes.