• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. and dutch authorities dismantle 39 domains linked to bec

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

You are here: Home / General Cyber Security News / U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network
February 1, 2025

U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating from Pakistan.

The action, which took place on January 29, 2025, has been codenamed Operation Heart Blocker.

The vast array of sites in question peddled phishing toolkits and fraud-enabling tools and was operated by a group known as Saim Raza since at least 2020, which is also known as HeartSender.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

These offerings were then used by transnational organized crime groups to target several victims in the United States as part of various business email compromise (BEC) schemes, leading to losses totaling over $3 million.

“The Saim Raza-run websites operated as marketplaces that advertised and facilitated the sale of tools such as phishing kits, scam pages, and email extractors, often used to build and maintain fraud operations,” the U.S. Department of Justice (DoJ) said.

“Not only did Saim Raza make these tools widely available on the open internet, it also trained end users on how to use the tools against victims by linking to instructional YouTube videos on how to execute schemes using these malicious programs, making them accessible to criminal actors that lacked this technical criminal expertise.”

The tools advertised on the marketplaces also made it possible to harvest victim user credentials, which were subsequently put to use to further the fraudulent schemes, the DoJ added.

In a coordinated statement, Dutch police officials said the criminal group sold various programs to facilitate digital fraud, which could be employed by cybercriminals to send phishing emails at scale or steal login credentials. The service is estimated to have had thousands of customers prior to its shutdown.

Users can check if they are among those impacted by credential theft by visiting the URL “www.politie[.]nl/checkjehack” and entering their email addresses.

The cybercrime entity, also referred to as The Manipulaters, was first exposed by independent security journalist Brian Krebs in May 2015, with a report from DomainTools last year identifying operational security lapses indicating that several systems associated with the threat actors have been compromised by stealer malware.

Cybersecurity

“Though lacking the technical sophistication many other large cybercrime vendors have, their most notable characteristic is being one of the earliest phishing-focused cybercrime marketplaces to horizontally integrate their business model while also spreading their operations across several separately branded shops,” the company said.

“Evidence suggests that new members have joined and at least one early member of The Manipulaters left the group. They appear to have a physical presence in Pakistan, including Lahore, Fatehpur, Karachi, and Faisalabad.”

The development follows the takedown of online criminal marketplaces such as Cracked, Nulled, Sellix, and StarkRDP as part of a coordinated law enforcement operation dubbed Talent towards the end of January 2025.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «beyondtrust zero day breach exposes 17 saas customers via compromised api BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key
Next Post: Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware crazy evil gang targets crypto with stealc, amos, and angel»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.