Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Home/CyberSecurity News/W3LL Phishing Kit Takedown Halts Global Hits Credential
CyberSecurity News

W3LL Phishing Kit Takedown Halts Global Hits Credential

In a historic joint operation with Indonesian law enforcement, the FBI Atlanta Field Office has successfully dismantled a massive global phishing network. The investigation targeted the notorious...

Emy Elsamnoudy
Emy Elsamnoudy
April 14, 2026 2 Min Read
4 0

In a historic joint operation with Indonesian law enforcement, the FBI Atlanta Field Office has successfully dismantled a massive global phishing network.

The investigation targeted the notorious W3LL phishing kit, a sophisticated toolset that enabled cybercriminals to bypass multi-factor authentication and attempt over $20 million in financial fraud.

This landmark case represents the first coordinated action against a phishing kit developer between the United States and Indonesia.

The W3LL Phishing Toolkit

The W3LL phishing kit operated as a highly accessible cybercrime-as-a-service platform, lowering the barrier to entry for novice hackers.

For a relatively low fee of about $500, threat actors could purchase the toolkit and immediately deploy fake websites designed to look identical to trusted corporate login portals.

However, the kit’s most dangerous feature was its ability to defeat modern security defenses.

When victims entered their information into these fraudulent sites, the tool did more than just harvest basic credentials. It actively captured session cookies and authentication tokens.

This technique allowed the attackers to bypass multi-factor authentication protocols seamlessly and establish persistent, unauthorized access to the compromised accounts without triggering immediate security alerts.

The phishing kit’s operations were heavily supported by a dedicated online marketplace known as W3LLSTORE.

This dark web hub served as a one-stop shop where cybercriminals could purchase stolen credentials, unauthorized corporate system access, and remote desktop connections.

The scale and impact of the W3LL operation were massive across the global threat landscape:

  • Between 2019 and 2023, the W3LLSTORE marketplace facilitated the sale of more than 25,000 compromised accounts.
  • From 2023 to 2024, the rebranded phishing kit targeted over 17,000 victims worldwide.
  • Cybercriminals leveraged the unauthorized access to attempt more than $20 million in fraudulent activities.
  • The tool’s developer secretly collected and resold access to the compromised accounts, effectively double-dipping on the stolen data.

Arrests and Infrastructure Seizures

Although the original W3LLSTORE shut down in 2023, the enterprise continued to thrive on encrypted messaging platforms.

Investigators persistently tracked the rebranded operation to uncover the individuals managing the network.

With assistance from the U.S. Attorney’s Office for the Northern District of Georgia, the FBI successfully identified and seized the core infrastructure facilitating the phishing service.

During the coordinated strike, the Indonesian National Police detained the alleged developer, identified only as G.L., and seized critical domains tied to the cybercrime network.

FBI Atlanta Special Agent in Charge Marlo Graham described the operation as a full-service cybercrime platform rather than a simple phishing tool.

By dismantling this infrastructure, law enforcement has severed a major resource that threat actors relied upon to infiltrate enterprise networks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerphishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

APT41 Turns Linux Cloud Servers Into Credential Theft Targets With

Next Post

Researcher Reverse Engineers 0-Day Disabling CrowdStrike E

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us