Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

Posted on June 5, 2025June 5, 2025 By CWS

Jun 05, 2025Ravie LakshmananDark Net / Regulation Enforcement
The U.S. Division of Justice (DoJ) on Wednesday introduced the seizure of cryptocurrency funds and about 145 clearnet and darkish net domains related to a bootleg carding market known as BidenCash.
“The operators of the BidenCash market use the platform to simplify the method of shopping for and promoting stolen bank cards and related private data,” the DoJ stated. “BidenCash directors charged a payment for each transaction performed on the web site.”
BidenCash launched in March 2022 to fill the void left by the shutdown of Joker’s Stash a yr earlier and a number of other different carding boards like UniCC.
For the reason that time it went operational, the unlawful bazaar (“bidencash[.]asia,” “bidencash[.]bd,” and “bidencash[.]ws”) is estimated to have supported greater than 117,000 clients, facilitated the trafficking of over 15 million fee card numbers and personally identifiable data, and generated a minimum of $17 million in income.

Particularly, the platform revealed 3.3 million particular person stolen bank cards totally free to advertise using their companies between October 2022 and February 2023. The stolen information contained bank card numbers, expiration dates, Card Verification Worth (CVV) numbers, account holder names, addresses, e mail addresses, and telephone numbers.
Of the two.1 million compromised bank cards launched in February 2023, 50% of the playing cards belonged to U.S.-based folks or entities, based on Flashpoint.
BidenCash additionally specialised within the sale of compromised credentials that would then be bought by different felony actors to acquire entry to computer systems with out authorization.
In a report revealed in Might 2023, CloudSEK revealed that BidenCash had begun to supply to promote SSH companies to consumers for as little as $2, alongside providing a package deal of companies to test the goal server for the presence of shell, in addition to details about its processing energy, location, and safety vulnerabilities, if any.
“This poses a big threat as menace actors can leverage this energy to conduct a variety of malicious actions, equivalent to information exfiltration, brute drive and ransomware assaults, and cryptocurrency mining,” the cybersecurity firm stated on the time.

Nonetheless, authorities didn’t disclose the worth of the confiscated cryptocurrency funds, or establish the operators of BidenCash and their bodily places.
The crackdown on BidenCash, based on the seizure banner, is a part of a world effort led by the U.S. Secret Service and the Federal Bureau of Investigation (FBI), in partnership with the Dutch Politie, the Shadowserver Basis, and Searchlight Cyber.

The event comes days after a multinational regulation enforcement operation confiscated 4 domains that provided counter-antivirus (CAV) and crypting companies to menace actors to make sure that their malicious software program stayed undetected from safety software program.
It additionally follows the arrest of a 35-year-old Ukrainian nationwide who’s alleged to have damaged into greater than 5,000 buyer accounts at an unnamed internet hosting firm to illicitly mine cryptocurrency on the hacked servers. The unnamed particular person faces as much as 15 years in jail.
The defendant is alleged to have used open-source intelligence to search out and breach the weak infrastructure of varied worldwide organizations after which deploy digital machines to conduct unauthorized cryptojacking, leading to $4.5 million in damages. The menace actor is believed to have been energetic since not less than 2018.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:BidenCash, Carding, DoJ, Domains, Global, Marketplace, Seizes, Takedown, Tied

Post navigation

Previous Post: Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach
Next Post: Carding Marketplace BidenCash Shut Down by Authorities 

Related Posts

Key Insights from the 2025 State of Pentesting Report The Hacker News
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News
Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks The Hacker News
HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass The Hacker News
Open Source Web Application Firewall with Zero-Day Detection and Bot Protection The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News