Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
U.S. DoJ Seizes Fraud Domain Behind .6 Million Bank Account Takeover Scheme

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

Posted on December 23, 2025December 23, 2025 By CWS

Dec 23, 2025Ravie LakshmananFinancial Crime / Legislation Enforcement
The U.S. Justice Division (DoJ) on Monday introduced the seizure of an internet area and database that it stated was used to additional a legal scheme designed to focus on and defraud Individuals by the use of checking account takeover fraud.
The area in query, web3adspanels[.]org, was used as a backend internet panel to host and manipulate illegally harvested financial institution login credentials. Customers to the web site at the moment are greeted by a seizure banner that claims the area was taken down in a global legislation enforcement operation led by authorities from the U.S. and Estonia.
“The legal group perpetrating the checking account takeover fraud delivered fraudulent ads via serps, together with Google and Bing,” the DoJ stated. “These fraudulent ads imitate the sponsored search engine ads utilized by official banking entities.”
The advertisements served as a conduit to redirect unsuspecting customers to faux financial institution web sites operated by the risk actors, who harvested login credentials entered by victims via an unspecified malicious software program program constructed into the websites. The stolen credentials had been then utilized by the criminals to signal into official financial institution web sites to take over victims’ accounts and drain their funds.

The scheme is estimated to have claimed 19 victims throughout the U.S. so far, together with two firms within the Northern District of Georgia, resulting in tried losses of roughly $28 million and precise losses of roughly $14.6 million.
The DoJ stated the confiscated area saved the stolen login credentials of 1000’s of victims, along with internet hosting a backend server to facilitate takeover fraud as lately as final month.
In response to info shared by the U.S. Federal Bureau of Investigation (FBI), the Web Crime Criticism Heart (IC3) has acquired greater than 5,100 complaints associated to checking account takeover fraud since January 2025, with reported losses upwards of $262 million.
Customers are suggested to train warning when sharing about themselves on-line or on social media; frequently monitor accounts for any monetary irregularities; use distinctive, advanced passwords; make sure the correctness of banking web site URLs earlier than signing in; and keep vigilant towards phishing assaults or suspicious callers.

The Hacker News Tags:Account, Bank, DoJ, Domain, Fraud, Million, Scheme, Seizes, Takeover, U.S

Post navigation

Previous Post: Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan
Next Post: Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Related Posts

New Advanced Linux VoidLink Malware Targets Cloud and container Environments New Advanced Linux VoidLink Malware Targets Cloud and container Environments The Hacker News
Google Pays .375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News
Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks WhatsApp Malware ‘Maverick’ Hijacks Browser Sessions to Target Brazil’s Biggest Banks The Hacker News
New ClickFix Campaign Exploits Sites for MIMICRAT Deployment New ClickFix Campaign Exploits Sites for MIMICRAT Deployment The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark