Connect with us

Phishing attack

Police Worldwide take down Phishing Service used by thousands of Hackers

Published

on

Police Worldwide take down Phishing Service used by thousands of Hackers

Introduction

Recent reports highlight that law enforcement agencies worldwide have successfully spoiled a major phishing-as-a-service (PhaaS) platform known as LabHost. Thousands of hackers used this platform to launch phishing attacks, steal personal data, and force individuals and businesses. The operation involved authorities from 19 countries, resulting in the arrest of 37 suspects and the attack of significant assets.

What Happened?

LabHost was a platform that provided hackers with the tools and infrastructure to create and launch phishing attacks. These attacks can be used to hack important information such as login credentials, credit card numbers, and social security numbers. Once this information is stolen, it can be used for identity theft, financial fraud, and other crimes. 

The takedown of LabHost is a major blow to the cybercrime ecosystem. It will make it more difficult for hackers to launch phishing attacks and hack personal data. It is also a message to cybercriminals that law enforcement is serious about cracking down on their activities.

Some Examples in the Real World

Law enforcement agencies have successfully dismantled several major phishing operations in recent years. Here are some factual examples:

1. LabHost Phishing Service Takedown (April 2024):

In April 2024, the UK’s Metropolitan Police Service, in collaboration with international law enforcement agencies, dismantled LabHost, a prominent Phishing-as-a-Service (PhaaS) platform. LabHost provided tools and templates enabling cybercriminals to conduct phishing attacks on a large scale. The operation led to the arrest of 37 individuals and the seizure of critical infrastructure, including servers and domains associated with the service. Europol

2. iServer Phishing Platform Disruption (Date Not Specified)

Law enforcement agencies in Spain, Argentina, Chile, Colombia, Ecuador, and Peru conducted operations resulting in 17 arrests and the seizure of over 900 items, including electronic devices and vehicles. The crackdown targeted the iServer phishing platform, which had over 2,000 users providing phone unlocking services to criminals in possession of stolen phones. The Record

3. 16shop Phishing Platform Takedown (Date Not Specified):

Interpol led a global investigation resulting in the takedown of 16shop, a phishing-as-a-service platform used by approximately 70,000 individuals. The operation led to the arrest of a 21-year-old individual associated with the platform. The Record

These operations highlight the ongoing efforts by international law enforcement agencies to combat phishing and cybercrime on a global scale.

Key Details:

Here are some of the key details of the LabHost takedown:

  • Law enforcement agencies conducted the operation in 19 countries.
  • 37 suspects were arrested. 
  • Significant assets were seized, including computers, servers, and bank accounts. 
  • LabHost was used by thousands of hackers to launch phishing attacks.
  • The platform provided hackers with the tools and infrastructure to create and launch phishing attacks.

Techniques of Phishing Attacks

Here are some examples of the types of phishing attacks that LabHost was used to launch:

  • Email phishing: Hackers would send fake emails that appeared to be from legitimate companies, such as banks or social media sites. These emails would contain malicious links or attachments that, when clicked on, would install malware on the victim’s computer. This malware could then be used to steal personal information or control the victim’s computer. 
  • Smishing: Hackers would send text messages that appeared to be from legitimate companies, such as banks or phone carriers. These text messages would contain malicious links that, when clicked on, would take the victim to a fake website where they would be asked to enter their personal information. 
  • Vishing: Hackers would make fake phone calls to victims, pretending to be from a legitimate company, such as a bank or the government. They would then try to trick the victim into giving them their personal information. 

Tips to Protect Against Phishing Attacks:

  1. Be Wary of Emails and Links: Avoid clicking on links or downloading attachments from unknown sources.
  2. Verify Authenticity: Contact organizations directly to confirm requests for sensitive information.
  3. Use Security Tools: Enable multi-factor authentication (MFA) and use anti-phishing software.

Read More

Spear phishing vs phishing: Understand the Risks

What is smishing and phishing?

Continue Reading
Advertisement

Emerging Technologies