Jump to content
  • Sign Up
×
×
  • Create New...

International police operation infiltrates LabHost phishing website used by thousands of criminals


Recommended Posts

  • Diamond Member



International police operation infiltrates LabHost phishing website used by thousands of **********

Police have shut down a web service used by more than 2,000 ********** worldwide to launch and manage

This is the hidden content, please
.

The Metropolitan Police worked with police forces from 19 countries to disrupt the world’s largest phishing-as-a-service platform, known as LabHost.

Law enforcement agencies made 37 arrests worldwide after searching over 70 addresses, with *** arrests at Manchester and Luton airports, in Essex and in London. The *** arrests include four people linked to running LabHost, including the site’s original developer.

LabHost offered

This is the hidden content, please
, which enabled subscribers to create fake websites designed to trick victims into revealing personal information including email addresses, bank details and passwords.

70,000 *** ****** victims

Detectives have established that 70,000 victims in the *** entered their details into one of LabHost’s fraudulent phishing sites. So far, around 25,000 victims in the *** have been informed that their data has been compromised.

Worldwide, the web service has been used to obtain 480,000 card numbers, 64,000 PINs and more than one million passwords, but final numbers are likely to be greater.

Since its creation in 2021, LabHost has received payments of just under £1m from ********* users. The Metropolitan Police said detectives have identified many of the ********** that used the service and investigations are continuing to track down those who have not yet been arrested.

Shortly after the platform was disrupted, 800 users received a warning message from detectives telling them “we know who they are and what they have been doing”.

Phishing as a service

****** as a service is a rapidly growing business model for providing tools, services or expertise to cyber ********** to conduct attacks.

LabHost offered a range of phishing services through tiered monthly subscriptions, which could be deployed in a few clicks.

Content on LabHost and its linked fraudulent sites has been replaced with a message stating police have seized the services

Customers used the service to target financial institutions and postal and telecommunications services with phishing emails and SMS messages. The site offed a menu of over 170 fake websites designed to look like those of legitimate organisations.

********** also used a management tool provided by the website, known as LabRat, to deploy phishing attacks and monitor and control them in real time. LabRat was designed to capture two-factor authentication codes, allowing ********** to bypass security protections.

Europol said law enforcement agencies had gathered a “vast amount” of data, which will be used to support ongoing investigations.

LabHost began in Canada

LabHost originated in Canada in 2021, offering phishing services in North America before expanding into the *** and Ireland, and later the rest of the world.

Cyber ********** could sign up to the service for US$179 a month, according to research by Trend Micro. The basic service offered users dozens of pages targeting ********* institutions, along with three active phishing pages. A premium membership tier, priced at US$249 a month, offered additional access to dozens of web pages targeting US institutions. The highest membership tier, for US$300 a month, offered over 70 phishing pages targeting organisations in nearly 30 countries.

The service provided phishing pages for several major *********, US and international banks, music streaming service Spotify, postal services including DHL and the Irish post office, insurance companies and road toll services. Users could also request bespoke phishing pages to mimic target organisations.

LabHost offered customisable phishing templates for customers to use to request names and addresses, email addresses, dates of birth, answers to standard security questions, card numbers, passwords and PINs.

The phishing service also offered technical support through a dedicated channel on the Telegram messaging service.

International investigation

Police began investigating LabHost in June 2022 after receiving intelligence from the

This is the hidden content, please
, a non-profit membership group for financial services organisations.

The Met’s Cyber ****** Unit went on to collaborate with the National ****** Agency (NCA), the City of London Police, Regional Organised ****** Units, Europol and international police forces.

Cyber security companies including Chainalysis, Intel 471,

This is the hidden content, please
, The Shadowserver Foundation and Trend Micro also took part in the investigation.

The investigation uncovered at least 40,000 phishing domains linked to LabHost, which had 10,000 users worldwide.

In Australia, police arrested five people and took down more than 200 servers used to host fraudulent phishing sites created by LabHost, after executing 22 search warrants across the country in an operation involving more than 200 officers. The *********** arm of the operation, codenamed Operation Nebulae, identified more than 100 suspects who use LabHost in Australia.

Police in Holland arrested five users and searched six homes, seizing 100 SIM cars and five firearms.

Met Police operation demonstrates *** capabilities

Lynne Owens, deputy commissioner of the Metropolitan Police Service, said: “Online fraudsters think they can act with impunity. They believe they can hide behind digital identities and platforms such as LabHost and have absolute confidence these sites are impenetrable by policing.”

Adrian Searle, director of the National Economic ****** Centre at the NCA, said: “****** is a terrible ****** that impacts victims both financially and psychologically, undermining our collective trust in others and the online services on which we all rely.

“This operation again demonstrates that *** law enforcement has the capability and intent to identify, disrupt and completely compromise ********* services that are targeting the *** on an industrial scale.”

A spokesperson for the Cyber Defence Alliance said: “The partnership with the Cyber Defence Alliance and law enforcement continues to develop. We have together, once again, been able to disrupt a major international ********* platform and prevented more people falling victim to these scams.”





This is the hidden content, please

#International #police #operation #infiltrates #LabHost #phishing #website #thousands #**********

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.