DoJ Dismantles $28M Bank Fraud Ring, Seizes Phishing Database

U.S. Department of Justice Seizes Database in Takedown of $28 Million Bank Account Takeover Scheme

HIGH
December 23, 2025
4m read
CyberattackPhishingIncident Response

Impact Scope

People Affected

At least 19 victims identified, with over 5,100 complaints filed with the IC3

Industries Affected

Finance

Geographic Impact

United States (national)

Full Report

Executive Summary

The U.S. Department of Justice (DoJ) has announced a significant enforcement action against a large-scale bank account takeover (ATO) fraud ring. Authorities seized the domain web3adspanels.org and its backend database, which the criminals used to store thousands of stolen bank login credentials. The operation involved creating sophisticated phishing websites that mimicked legitimate bank login pages to trick victims. The scheme resulted in approximately $14.6 million in actual losses and attempted to steal nearly $28 million. This takedown, led by the U.S. Attorney's Office for the Northern District of Georgia, highlights a successful disruption of a major cybercriminal enterprise and underscores the pervasive threat of phishing.


Threat Overview

The criminal operation was a classic phishing and ATO scheme. Attackers created fraudulent websites that were nearly identical to the real login pages of various U.S. financial institutions. Victims were lured to these sites, likely through phishing emails or malicious ads, and prompted to enter their usernames and passwords. This stolen information was then captured and stored in the backend database hosted at web3adspanels.org.

The attackers used the harvested credentials to log into the victims' real bank accounts, where they would drain funds and transfer them to accounts under their control. The FBI's Internet Crime Complaint Center (IC3) had previously issued a Public Service Announcement in November 2025 about this specific type of fraud, noting it had received over 5,100 complaints with losses exceeding $262 million since January 2025. The DoJ's operation was a coordinated effort involving international partners in Estonia and Georgia.


Technical Analysis

The core of the criminal infrastructure was the phishing kit and the backend panel. The panel served as a command-and-control center for the operation, allowing the criminals to manage their phishing pages and organize the stolen credentials.

MITRE ATT&CK Techniques

  • T1566.002 - Spearphishing Link: The primary vector for luring victims to the fraudulent websites was likely through links embedded in phishing emails or messages.
  • T1204.001 - Malicious Link: Victims were socially engineered to click on a malicious link that redirected them to the credential harvesting page.
  • T1078 - Valid Accounts: The entire scheme culminates in the use of valid, stolen credentials to perform unauthorized actions on the victims' bank accounts.
  • T1114.001 - Email Collection: Local Email Collection: While not explicitly stated, such schemes often involve an initial compromise to steal email contacts for wider phishing campaigns.

Impact Assessment

The financial impact of this operation was substantial, with $14.6 million in confirmed losses and millions more at risk. For the victims, this meant their bank accounts were drained, causing significant financial hardship and distress. The DoJ's seizure of the database and domain is a major disruption to the criminal group, preventing further losses and providing valuable intelligence for ongoing investigations. The case highlights the effectiveness of public-private partnerships and international law enforcement cooperation in combating cybercrime. However, the scale of the losses reported by the IC3 indicates that this type of fraud remains a widespread and persistent threat.


IOCs

Type Value Description
Domain web3adspanels.org The primary domain for the backend web panel used to store stolen credentials.

Detection & Response

For Financial Institutions:

  1. Threat Intelligence: Proactively monitor for newly registered domains that impersonate your brand (typosquatting). Services that track phishing kits can provide early warnings.
  2. Fraud Detection Analytics: Implement advanced analytics to detect suspicious account activity, such as logins from new devices/locations followed immediately by large transfers.
  3. D3FEND Techniques: Use D3-UGLPA - User Geolocation Logon Pattern Analysis to flag logins from unusual locations and D3-ANET - Authentication Event Thresholding to detect rapid login attempts.

For Individuals:

  1. Scrutinize Emails: Be wary of any unsolicited email asking you to log into your bank account. Check the sender's address carefully.
  2. Navigate Directly: Do not click on links in emails. Instead, type your bank's web address directly into your browser or use a trusted bookmark.

Mitigation

  1. Multi-Factor Authentication (MFA): This is the single most effective control against account takeover. Even if an attacker steals a password, they cannot access the account without the second factor. All financial institutions should offer and strongly encourage MFA.
  2. User Education: Continuous user awareness training is crucial. Educate customers on how to spot phishing attempts and the importance of not reusing passwords.
  3. Email Security: Implement robust email security gateways with anti-phishing technology, including DMARC, DKIM, and SPF, to block malicious emails from reaching users' inboxes.
  4. D3FEND Countermeasures: The most effective countermeasure is D3-MFA - Multi-factor Authentication. Additionally, banks can use D3-WSAA - Web Session Activity Analysis to detect non-human or suspicious behavior post-login.

Timeline of Events

1
January 1, 2025
The FBI's IC3 begins tracking a surge in complaints related to this type of account takeover fraud.
2
November 1, 2025
The FBI issues a Public Service Announcement warning about the fraud scheme.
3
December 22, 2025
The Department of Justice announces the seizure of the web3adspanels.org domain and database.
4
December 23, 2025
This article was published

MITRE ATT&CK Mitigations

The most effective defense against account takeover fraud after credential compromise.

Educate users and customers to recognize and report phishing attempts.

Use email and web filtering to block access to known phishing sites.

D3FEND Defensive Countermeasures

The cornerstone of defending against the bank account takeover scheme described is the widespread implementation of Multi-factor Authentication (MFA). Financial institutions must strongly encourage or mandate MFA for all customer accounts. Even when the attackers successfully harvested usernames and passwords from the phishing site web3adspanels.org, MFA would have prevented them from accessing the accounts. This is because they would lack the second factor (e.g., a code from a mobile app, an SMS message, or a hardware token). For high-value transactions, adaptive MFA that steps up authentication challenges should also be used. This single control invalidates the primary value of the stolen credentials.

To proactively combat phishing campaigns like this one, email security gateways and web proxies should perform rigorous URL analysis. This involves checking URLs against threat intelligence feeds of known malicious domains, such as the seized web3adspanels.org. Additionally, heuristic analysis can flag suspicious URLs that use typosquatting (e.g., yourbank-security.com instead of yourbank.com), contain multiple subdomains, or are hosted on newly registered domains. By analyzing and blocking these malicious links before they reach the user, organizations can prevent the initial step of the attack chain.

As a detective control, financial institutions should leverage User Geolocation Logon Pattern Analysis. The system should baseline the normal login locations for each user. When a login attempt occurs from a new or geographically improbable location (e.g., a user from Georgia logging in from Estonia minutes later), the system should flag the session as high-risk. This can trigger an automated response, such as requiring an additional step-up authentication challenge, sending an alert to the user, or temporarily locking the account. This technique helps to detect and stop fraudulent access even if both the password and a second factor were somehow compromised.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

account takeoverATOphishinglaw enforcementDOJfinancial fraud

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading