
"The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal scheme designed to target and defraud Americans by means of bank account takeover fraud. The domain in question, web3adspanels[.]org, was used as a backend web panel to host and manipulate illegally harvested bank login credentials. Users to the website are now greeted by a seizure banner that says the domain was taken down in an international law enforcement operation led by authorities from the U.S. and Estonia."
""The criminal group perpetrating the bank account takeover fraud delivered fraudulent advertisements through search engines, including Google and Bing," the DoJ said. "These fraudulent advertisements imitate the sponsored search engine advertisements used by legitimate banking entities." The ads served as a conduit to redirect unsuspecting users to fake bank websites operated by the threat actors, who harvested login credentials entered by victims through an unspecified malicious software program built into the sites. The stolen credentials were then used by the criminals to sign into legitimate bank websites to take over victims' accounts and drain their funds."
"The scheme is estimated to have claimed 19 victims across the U.S. to date, including two companies in the Northern District of Georgia, leading to attempted losses of approximately $28 million and actual losses of approximately $14.6 million. The DoJ said the confiscated domain stored the stolen login credentials of thousands of victims, in addition to hosting a backend server to facilitate takeover fraud as recently as last month."
The U.S. Justice Department seized the domain web3adspanels[.]org and its database after authorities found it served as a backend panel for illegally harvested bank login credentials. International law enforcement from the U.S. and Estonia led the takedown, and a seizure banner now appears on the site. Criminals ran fraudulent search ads on engines like Google and Bing that redirected victims to fake bank websites embedding malicious software to capture credentials. Stolen credentials were used to access legitimate bank accounts and drain funds. The scheme affected 19 known victims with attempted losses around $28 million and actual losses about $14.6 million, while the domain reportedly stored credentials for thousands; the FBI/IC3 has logged thousands of related complaints and substantial reported losses since January 2025.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]