{"id":45372,"date":"2026-04-14T06:14:24","date_gmt":"2026-04-13T22:14:24","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts\/"},"modified":"2026-04-14T06:14:24","modified_gmt":"2026-04-13T22:14:24","slug":"fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts\/","title":{"rendered":"FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgb77IQHAfOvWFPWb_cgV_YJGdRtNJJJWBcjYH6M6cCawBv2tQdybani7Qet_LGwH1tTBHJ2P3Lr6gWdY0sz3547YLzkSLWX3T2l84-A7ndRK3T55QblpJ-j2ovE9Lq0CoNb6ckWziwD2UjKP_awFJXbGr3yuZ1IMPndUyCo_WfoJ9nnyTPFf-K4HVy5A8g\/s1600\/well-fbi.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgb77IQHAfOvWFPWb_cgV_YJGdRtNJJJWBcjYH6M6cCawBv2tQdybani7Qet_LGwH1tTBHJ2P3Lr6gWdY0sz3547YLzkSLWX3T2l84-A7ndRK3T55QblpJ-j2ovE9Lq0CoNb6ckWziwD2UjKP_awFJXbGr3yuZ1IMPndUyCo_WfoJ9nnyTPFf-K4HVy5A8g\/s1600\/well-fbi.jpg\" alt=\"FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts\"\/><\/a><\/div>\n<p>The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit&nbsp;called <strong>W3LL<\/strong> to steal thousands of victims&#8217; account credentials and attempt more than $20 million in&nbsp;fraud.<\/p>\n<p>In tandem, authorities detained the alleged developer, who has&nbsp;been identified&nbsp;as G.L, and seized key domains linked to the phishing&nbsp;scheme. &#8220;The takedown cuts off a major resource used by cybercriminals to gain unauthorized access to victims&#8217; accounts,&#8221; the&nbsp;FBI <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/atlanta\/news\/fbi-atlanta-indonesian-authorities-take-down-global-phishing-network-behind-millions-in-fraud-attempts\">said<\/a> in a statement.&nbsp;<\/p>\n<p>The W3LL phishing&nbsp;kit allowed criminals to mimic legitimate login&nbsp;pages to&nbsp;deceive victims into handing over their credentials, thus&nbsp;allowing the&nbsp;attackers to seize control of their&nbsp;accounts. The phishing&nbsp;kit was advertised for a fee of about&nbsp;$500.<\/p>\n<p>The phishing kit enabled its customers to deploy bogus websites that mimicked their legitimate counterparts, masquerading as trusted login portals to harvest credentials.<\/p>\n<p>&#8220;This wasn&#8217;t just phishing &#8211; it was a full-service cybercrime platform,&#8221; FBI Atlanta Special Agent in Charge Marlo Graham said. &#8220;We will continue to work with our domestic and foreign law enforcement partners, using all available tools to protect the&nbsp;public.&#8221;<\/p>\n<p>W3LL&nbsp;was <a href=\"https:\/\/thehackernews.com\/2023\/09\/w3ll-store-how-secret-phishing.html\">first documented<\/a> by Singapore-headquartered Group-IB in September&nbsp;2023, highlighting the operators&#8217; use of an underground marketplace called the W3LL Store that served approximately 500 threat actors and allowed them to purchase access to the W3LL Panel phishing&nbsp;kit alongside other cybercrime tools for business email compromise (BEC)&nbsp;attacks.<\/p>\n<p>The cybersecurity company described W3LL as an all-in-one phishing platform that offers a wide range of services, right from custom phishing tools and mailing lists to access to compromised&nbsp;servers. The threat actor behind the illicit&nbsp;service is&nbsp;believed to have been active since 2017, previously developing bulk email spam&nbsp;tools like PunnySender and W3LL&nbsp;Sender.<\/p>\n<p>Per the FBI, the W3LL Store also facilitated the sale of stolen credentials and unauthorized system&nbsp;access, including remote desktop connections. More than 25,000 compromised accounts are estimated to&nbsp;have been&nbsp;peddled in the storefront between 2019 and&nbsp;2023.<\/p>\n<p>&#8220;Primarily focused on Microsoft 365 credentials, W3LL utilizes adversary-in-the-middle (AitM) to hijack session cookies and bypass multi-factor authentication,&#8221;&nbsp;Hunt.io&nbsp;<a href=\"https:\/\/hunt.io\/blog\/phishing-kit-targets-outlook-credentials\">said<\/a> in a report published in March&nbsp;2024.<\/p>\n<p>Then last year, French security company Sekoia, in its analysis of another phishing kit known&nbsp;as <a href=\"https:\/\/thehackernews.com\/2025\/01\/new-sneaky-2fa-phishing-kit-targets.html\">Sneaky&nbsp;2FA<\/a>, revealed the tool &#8220;reused a few bits of code&#8221; from the W3LL Store phishing syndicate, adding that cracked versions of W3LL&nbsp;have been circulated in the past few&nbsp;years.<\/p>\n<p>&#8220;Even after W3LLSTORE shut down in 2023, the operation continued through encrypted messaging platforms, where the tool was rebranded and actively marketed,&#8221; the FBI said. &#8220;From 2023 to 2024&nbsp;alone, the phishing kit was&nbsp;used to target more than 17,000 victims worldwide.&#8221;<\/p>\n<p>&#8220;The developer behind the tool collected and resold access to compromised accounts, amplifying the reach and impact of the&nbsp;scheme.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit&nbsp;called W3LL to steal thousands of victims&#8217; account credentials and attempt more than $20 million in&nbsp;fraud.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45372","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45372"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45372\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}