Microsoft scores win in opposition to Workplace 365 credential thieves
Investigators from Microsoft’s Digital Crimes Unit (DCU) have disrupted the community behind the damaging RaccoonO365 infostealer malware that focused the usernames and credentials of Workplace 365 customers after being granted a courtroom order within the Southern District of New York.
The operation noticed a complete of 338 web sites linked to the favored malware seized and its technical infrastructure disrupted, severing RaccoonO365 customers’ entry to their victims.
RaccoonO365 – which was tracked in Microsoft’s menace actor matrix as Storm-2246 – was a comparatively unsophisticated, subscription-based phishing equipment that exploited Microsoft’s personal branding to make its pretend e mail, attachments and web sites appear life like sufficient to trick victims into interacting with them.
Microsoft’s Stephen Masada, DCU assistant normal counsel, stated the case confirmed that efficient cyber criminals didn’t should be significantly refined to have an effect: “Since July 2024, RaccoonO365’s kits have been used to steal at the least 5,000 Microsoft credentials from 94 international locations.
“Whereas not all stolen data leads to compromised networks or fraud as a result of number of safety features employed to remediate threats, these numbers underscore the dimensions of the menace and the way social engineering stays a go-to tactic for cyber criminals.
“Extra broadly, the speedy improvement, advertising and accessibility of companies reminiscent of RaccoonO365 point out that we’re getting into a troubling new part of cyber crime the place scams and threats are more likely to multiply exponentially.”
The DCU operation seems to have come on the proper time as previously 12 months, Microsoft stated RaccoonO365 had undergone a speedy technical evolution with common upgrades to satisfy rising demand.
Amongst different issues, customers have been in a position to enter 9,000 goal e mail addresses daily, and will additionally “profit” from on-board options that enabled them to bypass multi-factor authentication (MFA) safeguards and set up persistent entry on their victims’ computer systems.
Previously few months, RaccoonO365’s operators additionally began promoting an AI service that supposedly enabled customers to scale their operations and enhance the effectiveness of their assaults.
Management recognized
On the identical time, the DCU has named a Nigerian nationwide, Joshua Ogundipe, because the chief of the enterprise behind RaccoonO365. He was recognized following an operational safety lapse wherein the gang by chance revealed a secret cryptocurrency pockets, which the DCU stated drastically helped with attribution.
It accused Ogundipe and associates of promoting their companies through Telegram to their clients, estimated to be round 100 to 200 subscriptions primarily based on the group’s membership of 845 (as of 25 August) – though that is probably an underestimate.
In accordance with Cloudflare, which labored with the DCU all through the takedown, entry to the RaccoonO365 phishing equipment was offered on a subscription foundation, with 30-day plans accessible for $355 and 90-day plans for $999, payable in varied types of cryptocurrency.
Alongside his associates, Ogundipe, who supposedly has a background in pc programming and is assumed to have written the majority of RaccoonO365, ran a seemingly skilled organisation with specialist improvement, gross sales and buyer assist assets.
To obfuscate their actions, the gang registered a number of web domains with pretend names and addresses world wide, though screengrabs of Ogundipe’s LinkedIn profile shared by the DCU counsel he could also be positioned in Benin Metropolis in southern Nigeria.
A legal referral for his arrest has been circulated to worldwide regulation enforcement. Nonetheless, whether or not or not he ever faces justice is unknown, stated Masada.
“Authorized challenges persist, particularly in locations the place prosecuting cyber criminals is troublesome. At present’s patchwork of worldwide legal guidelines stays a significant impediment and cyber criminals exploit these gaps,” stated Masada.
“Governments should work collectively to align their cyber crime legal guidelines, velocity up cross-border prosecutions and shut the loopholes that allow criminals function with impunity. The worldwide group also needs to assist nations which might be working to strengthen their defences, whereas holding accountable people who flip a blind eye to cyber crime.
“Whereas we press ahead within the courts, organisations and people also needs to proceed to bolster their defences. Which means enabling robust multi-factor authentication on accounts, utilizing up-to-date anti-phishing and safety instruments, and educating customers to remain vigilant in opposition to evolving scams.”

