Microsoft nukes a hacking-as-a-service Startup, blocks 340+ websites

Why India’s bond with Russia remains strong
How Kohli built his ₹1,000 crore empire
Stop burning money on food delivery; Here’s the smarter switch
India’s Uber-killer? Drivers launch their own app, Bharat Taxi
Germany’s new specialised drone defence unit
Consultant vs employee: What’s really better for your career?
Daily habit India’s top CEOs rely on for clarity and focus
DroneAcharya: From star-backed IPO success to SEBI ban
Have Asia's GenZ protests reached Europe
18 SEP 2025 | 12:41:21

Microsoft recently dismantled a phishing operation so industrial that it looked more like a startup than a criminal ring: the company seized about 340 websites tied to a subscription-based service known as Raccoon0365.

On the surface, the story looks familiar: fake login pages, stolen passwords, victims left to pick up the pieces. But the details make clear how phishing has evolved.

Raccoon0365 did not rely on a small group of technically gifted loners; it monetised simplicity. For a subscription fee, customers were given ready-built phishing pages, URL generation tools and templates that impersonated Microsoft. That lowered the barrier to entry: anyone willing to pay could run mass credential-harvesting campaigns.

Scale, sophistication, and blunt mistakes

Hackers used seemingly-realistic Microsoft login sites and even layered protections to make their pages seem legitimate to human visitors. In some cases, the infrastructure employed bot-checks and CAPTCHA services to serve phishing pages only to real people, a tactic that both improved success rates and made detection even harder.

The shocking revelation is that Microsoft’s filings and public statements link the service to the theft of thousands of Microsoft credentials and indicate the operators collected more than $100,000 in cryptocurrency since launching.

Eventually, in one particularly aggressive campaign, attackers sent tax-themed lures that targeted over 2,300 U.S. organisations in one go within a matter of weeks.

But for every Thanos we have an Avenger.

Investigators said the group made operational mistakes that left traces, which were enough for Microsoft, working with U.S. law enforcement partners, to map their infrastructure, obtain a court order and seize domains. Cloudflare also assisted in disrupting the actors’ ability to rebuild on its platform.

A Telegram channel, subscribers and the normalisation of crime

What turns a criminal service into something eerily familiar is how it marketed itself. Raccoon0365’s operators ran a private Telegram channel with hundreds of subscribers, using it to sell access, share templates and coordinate campaigns, a crude marketplace that mimicked legitimate SaaS communities, complete with tiered pricing and user support. That marketing component is a worrisome evolution: crime built around repeat customers and community.

This model, often called “phishing-as-a-service”, does two things at once.

It commoditises attack tooling so non-technical fraudsters can execute complex campaigns, and it scales victimisation rapidly, because a single operational platform can be reused across campaigns, targets and industries.

Real victims, real consequences

The victims were not random individuals alone. Microsoft and partner organisations linked Raccoon0365’s activity to breaches affecting healthcare organisations and businesses across multiple sectors.

The implications of corporate credential theft are acute: with a compromised account, attackers can pivot into corporate networks, access sensitive records, disrupt services or deploy ransomware. Health-sector compromises, in particular, can jeopardise patient data and disrupt care delivery.

What the takedown achieved, and what it didn’t

Seizing 340 domains is a significant blow: it interrupts active campaigns and drains immediate infrastructure.

But these platforms are resilient. Operators can migrate code, set up new domains, or switch to decentralised infrastructures and alternative hosting. The takedown buys time and raises the bar for the current operators, yet it does not cure the underlying economics that make phishing profitable.

Microsoft framed the action as part of a broader effort to disrupt the cybercrime supply chain, not just to stop individual campaigns but to make “crime tools” harder to sell and reuse.

That strategy aims to reduce the volume of low-effort attacks available to would-be fraudsters. Still, specialists warn that every disruption is likely to be followed by adaptation and reinvention.

Why this matters beyond the headlines

Raccoon0365 is now a case study in how cybercrime is professionalising. When a criminal enterprise looks and acts like a legitimate business, marketing, subscription tiers, user communities, prevention becomes both a technical and a social problem.

The Microsoft takedown is a win for defenders, and a reminder that tech firms, law enforcement and infrastructure providers can collaborate successfully.

But it’s only one of the battles in an ongoing campaign: as long as phishing remains effective and profitable, new services will appear to fill the void. Vigilance, better defaults, and faster information-sharing will be how most organisations stay a step ahead.

Logo
Download App
Play Store BadgeApp Store Badge
About UsContact UsTerms of UsePrivacy PolicyCopyright © Editorji Technologies Pvt. Ltd. 2025. All Rights Reserved