Connect with us

Security

Federal Agents Bust Cybercrime Ring: Seize Domain Holding Stolen Bank Data

Published

on

FBI Seizes Domain Hosting Stolen Bank Credentials

The U.S. government has taken control of the ‘web3adspanels.org’ domain and the database used by cybercriminals to store stolen bank login details obtained through account takeover attacks.

Cybercriminals acquired these credentials through phishing campaigns that targeted American citizens via deceptive ads on Google and Bing search platforms, redirecting them to fake banking websites.

The confirmed financial loss resulting from this criminal activity is estimated at $14.6 million, but the FBI believes that the attempted losses could have reached as high as $28 million.

The Department of Justice revealed, “The FBI has identified 19 victims across the U.S., including two companies in the Northern District of Georgia, whose bank accounts were compromised in this scheme, resulting in attempted losses of $28 million and actual losses of $14.6 million.”

The seized domain hosted a server containing login details of numerous victims, including those mentioned earlier.

During the investigation, the FBI discovered that the seized domain was actively used to host a backend server as recently as November.

The seizure was executed with the help of Estonian law enforcement and other international partners.

Currently, the domain displays a law enforcement banner indicating it is under official control.

Seizure
Source: BleepingComputer.com

No arrests have been made yet, but the investigation could lead to identifying the perpetrators behind this criminal operation.

Since January, the FBI’s Internet Crime Complaint Center has received over 5,100 complaints related to bank account takeovers, with reported losses exceeding $262 million.

For online banking users, it is advised to bookmark official banking websites instead of relying on search engines like Google or Bing, or utilize ad blockers to eliminate sponsored results completely.

Trending