FBI takedown of W3LL phishing service leads to developer arrest
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。 首先,我得仔细阅读文章内容。文章主要讲述了FBI亚特兰大办公室和印尼当局联手摧毁了一个名为“W3LL”的全球钓鱼平台。他们扣押了相关基础设施,并逮捕了涉嫌开发该平台的人。这似乎是美印两国首次针对钓鱼工具包开发者进行的联合执法行动。 接下来,文章详细介绍了W3LL Store的情况。这个平台不仅销售钓鱼工具包,还作为一个在线市场,让网络犯罪分子窃取数千个凭证,并尝试进行超过2000万美元的欺诈活动。此外,W3LL Store还允许攻击者创建逼真的企业登录页面副本,以窃取凭证,并能捕获认证会话令牌,绕过多重身份验证。 还有提到该平台从2019年到2023年期间促成了超过25,000个被入侵账户的销售,甚至在关闭后仍通过加密消息平台继续运营。工具包被用于针对全球超过17,000名受害者,并被链接到针对微软365企业账户的活动。 现在,我需要将这些信息浓缩到100字以内。重点包括:FBI和印尼的合作行动、摧毁W3LL平台、逮捕开发者、该平台的功能及其影响范围。 可能的结构是:FBI和印尼合作摧毁W3LL钓鱼平台,逮捕开发者;该平台用于销售工具包和市场交易,导致大量欺诈和账户入侵。 最后检查字数是否在限制内,并确保信息准确无误。 </think> FBI与印尼当局合作摧毁了全球钓鱼平台"W3LL",逮捕其开发者。该平台通过销售钓鱼工具包和在线市场非法交易被盗凭证及网络访问权限,导致数万账户被入侵及超25,000次欺诈行为。 2026-4-13 19:1:46 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

Phishing hook

The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged developer in what is described as the first coordinated enforcement action between the United States and Indonesia targeting a phishing kit developer.

The W3ll Store was a phishing kit and online marketplace that enabled cybercriminals to steal thousands of credentials and attempt more than $20 million in fraud. 

"This Website Has Been Seized as part of a coordinated law enforcement action taken against W3LL STORE," reads a seizure message on w3ll[.]store website.

Wiz

"The domain for w3ll.store has been seized by the Federal Bureau of Investigation in accordance with a seizure warrant issued pursuant to 18 U.S.C. §§ 981 and 982 by the United States District Court for the Northern District of Georgia as part of a joint law enforcement action by the Federal Bureau of Investigation."

Seizure banner shown on the W3LL Store site
Seizure banner shown on the W3LL Store site
Source: BleepingComputer

The W3LL phishing kit sold for $500 and allowed attackers to create convincing replicas of corporate login portals to harvest credentials.  The kit allowed threat actors to capture authentication session tokens, enabling attackers to bypass multi-factor authentication and gain access to compromised accounts.

W3LL Store and W3LL Panel administration
W3LL Store and W3LL Panel administration
Source: Group-IB

The threat actor also offered a marketplace called W3LLSTORE, where stolen credentials and unauthorized network access were bought and sold. 

"This wasn't just phishing—it was a full-service cybercrime platform," said FBI Special Agent Charge Marlo Graham

Authorities say the marketplace facilitated the sale of more than 25,000 compromised accounts between 2019 and 2023, and even after W3LLSTORE shut down, the operation continued through encrypted messaging platforms, where the toolkit was rebranded and sold to other threat actors.

Between 2023 and 2024, the phishing kit was used to target more than 17,000 victims worldwide, with investigators finding that the developer collected and resold access to compromised accounts. 

The W3LL phishing platform was previously linked to campaigns targeting Microsoft 365 corporate accounts and was designed to support business email compromise (BEC) attacks from initial access through post-exploitation.

The phishing kit relied on adversary-in-the-middle attacks, which is when legitimate login portals are proxied through an attacker's infrastructure.

This allows the threat actors to monitor for and intercept credentials, one-time MFA passcodes, and session cookies in real time. These session cookies could then be used to log into the compromised accounts without triggering MFA authentication challenges.

Once access was obtained, attackers would monitor inboxes, create email rules, and impersonate victims to commit invoice fraud and redirect payments in BEC attacks.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/fbi-takedown-of-w3ll-phishing-service-leads-to-developer-arrest/
如有侵权请联系:admin#unsafe.sh