Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Feds Seize Password Database Used in Massive Bank Account Takeover Scheme

The cybercriminals attempted to steal $28 million from compromised bank accounts through phishing.

web3adspanels seized

The US Justice Department announced on Monday the seizure of a web domain and a password database used by a cybercrime group to steal millions of dollars from bank accounts.

According to the DOJ, the seized domain, web3adspanels.org, hosted a backend web panel used by the cybercriminals to store and manipulate thousands of stolen bank login credentials.

The threat actor conducted a massive bank account takeover scheme that involved malicious ads on search engines such as Google and Bing in an effort to lure users to fake bank websites.

These phishing sites tricked victims into handing over their login credentials, which the cybercriminals could then use to access and drain their bank accounts.

The FBI has identified nearly 20 victims in the US, including two companies, and has determined that the cybercriminals attempted to steal roughly $28 million, with the actual losses estimated at approximately $14.6 million. 

Estonian law enforcement, which also took part in the operation, “preserved and collected data from servers hosting the phishing pages and the stolen login credentials used in furtherance of the scheme,” the DOJ said.

Advertisement. Scroll to continue reading.

The Justice Department has not mentioned any arrests or charges. 

The announcement comes less than a month after the FBI reported that cybercriminals engaging in account takeover schemes have caused over $262 million in losses since January 2025.

The DOJ’s announcement also comes shortly after Troy Hunt, the administrator of the Have I Been Pwned (HIBP) data breach notification service, revealed that the FBI had provided a collection of 630 million compromised passwords for analysis.

HIBP enables users to learn whether their credentials have been compromised in a data breach, based on their email address. The service has cataloged more than 17 billion credentials. 

Hunt’s analysis showed that the passwords provided by the FBI likely did not come from a single breach, but from various sources, such as cybercrime marketplaces and infostealer malware. Approximately 46 million of the passwords, representing 7.4% of the total, had not been in the HIBP database.

It’s unclear if the passwords analyzed by Hunt are in any way related to the DOJ’s Monday announcement. 

Related: 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings

Related: ATM Hackers Using ‘Ploutus’ Malware Charged in US

Related: Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in US

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.