comscore

Microsoft nukes a hacking-as-a-service Startup, blocks 340+ websites

Meta's Ray-Ban Display glasses may finally replace your smartphone
Spotify just made its free tier way better — here’s what changed
Warning Issued: 'Nano Banana' Trend is a New Hunting Ground for Scammers
Xiaomi 17 Series to rival iPhone 17 with bold move
Why the iPhone 17 Pro Max Cosmic Orange is 2025’s hottest iPhone
iOS 26 Installation Guide: Which iPhones get it and how to update
Why skipping AppleCare+ on the iPhone Air is a mistake you’ll regret
Spotify Lossless is live: Here's how to enable CD-quality sound
Meet the new AI craze: 3D figurines from selfies with Google’s Nano Banana
Tech
Rohit Sinha
18 SEP 2025 | 12:41:21

Microsoft recently dismantled a phishing operation so industrial that it looked more like a startup than a criminal ring: the company seized about 340 websites tied to a subscription-based service known as Raccoon0365.

On the surface, the story looks familiar: fake login pages, stolen passwords, victims left to pick up the pieces. But the details make clear how phishing has evolved.

Raccoon0365 did not rely on a small group of technically gifted loners; it monetised simplicity. For a subscription fee, customers were given ready-built phishing pages, URL generation tools and templates that impersonated Microsoft. That lowered the barrier to entry: anyone willing to pay could run mass credential-harvesting campaigns.

Scale, sophistication, and blunt mistakes

Hackers used seemingly-realistic Microsoft login sites and even layered protections to make their pages seem legitimate to human visitors. In some cases, the infrastructure employed bot-checks and CAPTCHA services to serve phishing pages only to real people, a tactic that both improved success rates and made detection even harder.

The shocking revelation is that Microsoft’s filings and public statements link the service to the theft of thousands of Microsoft credentials and indicate the operators collected more than $100,000 in cryptocurrency since launching.

Eventually, in one particularly aggressive campaign, attackers sent tax-themed lures that targeted over 2,300 U.S. organisations in one go within a matter of weeks.

But for every Thanos we have an Avenger.

Investigators said the group made operational mistakes that left traces, which were enough for Microsoft, working with U.S. law enforcement partners, to map their infrastructure, obtain a court order and seize domains. Cloudflare also assisted in disrupting the actors’ ability to rebuild on its platform.

A Telegram channel, subscribers and the normalisation of crime

What turns a criminal service into something eerily familiar is how it marketed itself. Raccoon0365’s operators ran a private Telegram channel with hundreds of subscribers, using it to sell access, share templates and coordinate campaigns, a crude marketplace that mimicked legitimate SaaS communities, complete with tiered pricing and user support. That marketing component is a worrisome evolution: crime built around repeat customers and community.

This model, often called “phishing-as-a-service”, does two things at once.

It commoditises attack tooling so non-technical fraudsters can execute complex campaigns, and it scales victimisation rapidly, because a single operational platform can be reused across campaigns, targets and industries.

Real victims, real consequences

The victims were not random individuals alone. Microsoft and partner organisations linked Raccoon0365’s activity to breaches affecting healthcare organisations and businesses across multiple sectors.

The implications of corporate credential theft are acute: with a compromised account, attackers can pivot into corporate networks, access sensitive records, disrupt services or deploy ransomware. Health-sector compromises, in particular, can jeopardise patient data and disrupt care delivery.

What the takedown achieved, and what it didn’t

Seizing 340 domains is a significant blow: it interrupts active campaigns and drains immediate infrastructure.

But these platforms are resilient. Operators can migrate code, set up new domains, or switch to decentralised infrastructures and alternative hosting. The takedown buys time and raises the bar for the current operators, yet it does not cure the underlying economics that make phishing profitable.

Microsoft framed the action as part of a broader effort to disrupt the cybercrime supply chain, not just to stop individual campaigns but to make “crime tools” harder to sell and reuse.

That strategy aims to reduce the volume of low-effort attacks available to would-be fraudsters. Still, specialists warn that every disruption is likely to be followed by adaptation and reinvention.

Why this matters beyond the headlines

Raccoon0365 is now a case study in how cybercrime is professionalising. When a criminal enterprise looks and acts like a legitimate business, marketing, subscription tiers, user communities, prevention becomes both a technical and a social problem.

The Microsoft takedown is a win for defenders, and a reminder that tech firms, law enforcement and infrastructure providers can collaborate successfully.

But it’s only one of the battles in an ongoing campaign: as long as phishing remains effective and profitable, new services will appear to fill the void. Vigilance, better defaults, and faster information-sharing will be how most organisations stay a step ahead.

Logo
Download App
Play Store BadgeApp Store Badge
About UsContact UsTerms of UsePrivacy PolicyCopyright © Editorji Technologies Pvt. Ltd. 2025. All Rights Reserved