Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

April 13, 2026

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

April 13, 2026

FBI Dismantles $20m Phishing Operation W3LL

April 13, 2026
Facebook X (Twitter) Instagram
Monday, April 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»FBI Dismantles $20m Phishing Operation W3LL
News

FBI Dismantles $20m Phishing Operation W3LL

Team-CWDBy Team-CWDApril 13, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


US and Indonesian law enforcement authorities have taken down a large-scale phishing network that has plotted over $20 million in fraud.

Spearheaded by the FBI Atlanta field office, the operation targeted W3LL, a phishing kit which enables cybercriminals to impersonate legitimate login pages and trick victims into handing over their usernames and passwords. W3LL capabilities could be acquired for a fee of $500.

The kit was notably sold on ‘W3LL Store,’ a members-only online marketplace, which was active between 2019 and 2023.

According to Fox 5 Atlanta, investigators believe the marketplace facilitated the sale of more than 25,000 compromised accounts until its closure in 2023.

The phishing operation continued after the marketplace shut down via encrypted messaging apps. Between 2023 and 2025, W3LL may have been used to target more than 17,000 victims worldwide.

The FBI said it has seized the w3ll.store domain and identified its alleged developer, publicly referred to as ‘G.L.’

W3LL: A Complete Phishing Ecosystem for BEC Attacks

W3LL was first discovered in 2023 by cybersecurity firm Group-IB.

In a September 2023 report, the firm’s researchers claimed the threat actor behind the phishing operation had been operating since at least 2017, when it began selling the W3LL SMTP Sender – a custom tool for sending email spam.

The malicious actor later started selling a phishing kit for Microsoft 365 accounts and subsequently opened the W3LL Store.

At the time the report was published, Group-IB observed that that the marketplace had over 500 active users and more than 12,000 items listed for sale. Researchers estimated the W3LL Store had generated $500,000 for the actor over a 10-month period.

The researchers also assessed that the W3LL phishing kit had been linked to 850 phishing sites over the same reported period.

Group-IB noted that what made the W3LL Store and its products stand out from other underground markets is that the threat actor created not just a marketplace but a complex phishing ecosystem. The fully compatible custom toolset covered almost the entire kill chain of business email compromise (BEC) and could be used by cybercriminals of all technical skill levels.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Next Article $285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
Team-CWD
  • Website

Related Posts

News

Mailbox Rule Abuse Emerges as Stealthy Post-Compromise Threat

April 13, 2026
News

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

April 13, 2026
News

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

April 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

How to help older family members avoid scams

October 31, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.