Key Takeaways
The Department of Justice (DOJ) has announced the seizure of a web domain and a database containing stolen login credentials, which were allegedly a critical component in a scheme designed to execute bank account takeovers on a large scale.
The operation targeted the illicit marketplace where these credentials were likely traded or utilized to launch automated attacks against banking systems.
The seized database was instrumental in enabling credential stuffing attacks, a technique where attackers use stolen username and password pairs to gain unauthorized access to user accounts.
“The domain, web3adspanels.org, was used by those involved in the scheme as a backend web panel to store and manipulate illegally harvested bank login credentials,” a recent DoJ press release stated.
An unnamed cybercriminal group used fraudulent search engine ads on platforms like Google and Bing to mimic legitimate bank advertisements, redirecting victims to phishing websites impersonating banks, according to the DoJ.
These sites harvested login credentials through malicious software, which the criminals then used to access real bank accounts and steal funds.
This operation posed a severe threat to the integrity of the financial sector. The FBI, which recently warned of fraud via bank support impersonation, identified at least 19 victims across the U.S., with attempted losses of approximately $28 million and actual losses of approximately $14.6 million.
In October, the U.S. Secret Service cracked down on payment card fraud, removing 22 card skimmers in a Maryland operation, and fake VPN and streaming apps spread malware targeting Android banking users.