Thursday, April 17, 2025
HomeCyber Security NewsAuthorities Seized 39 Websites that Selling Hacking Tools to Launch Cyber Attacks

Authorities Seized 39 Websites that Selling Hacking Tools to Launch Cyber Attacks

Published on

SIEM as a Service

Follow Us on Google News

Authorities have seized 39 websites allegedly used to sell hacking tools and fraud-enabling software.

The crackdown targeted a Pakistan-based network of online marketplaces operated by a group known as Saim Raza (aka HeartSender), which allegedly facilitated cyberattacks on individuals and businesses worldwide.

The announcement was made by U.S. Attorney Nicholas J. Ganjei, Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division, and Special Agent in Charge Douglas Williams of the FBI.

- Advertisement - Google News

The operation, conducted on January 29, was a collaborative effort involving the FBI and the Dutch National Police.

The seized websites have been replaced with a seizure notification that displays the logos of the Department of Justice (DOJ) and the FBI, informing visitors that the domains are now under federal custody.

Hacking Tools for Sale Since 2020

According to an affidavit supporting the seizures, Saim Raza used these websites since at least 2020 to sell phishing toolkits, scam pages, and other digital tools designed to facilitate fraud.

These tools were marketed primarily to transnational organized crime groups, who used them to launch various schemes and scams.

The cybercriminals’ activities reportedly caused over $3 million in losses to victims in the United States alone.

“These scams not only target businesses but individuals as well, causing significant hardship to the victims,” said U.S. Attorney Ganjei.

“The ease with which these malicious hacking tools were sold online for a fee made it possible for criminals abroad to harm people globally. Today, however, we have disrupted their operations and delivered a major blow to their ability to continue spreading harm.”

The seized websites not only offered hacking tools for sale but also provided tutorials to assist buyers in using them.

These included links to instructional YouTube videos teaching cybercriminals how to execute phishing schemes using the purchased tools.

Marketed as “fully undetectable” by anti-spam software, these tools provided even low-skilled criminals with the ability to carry out sophisticated cyberattacks.

Fraudulent Schemes and Victim Losses

The primary use of these tools was to facilitate business email compromise (BEC) schemes.

Criminals used these schemes to impersonate executives or vendors and trick companies into transferring funds into accounts controlled by the perpetrators.

The tools also enabled criminals to steal login credentials and escalate fraud operations, leading to significant financial losses.

The seizure of these domains aims to disrupt the ongoing activities of these cybercriminal groups and prevent the further proliferation of these tools.

The FBI’s Houston Field Office spearheaded the investigation, with invaluable cooperation from Dutch authorities.

Assistant U.S. Attorney Rodolfo Ramirez and Trial Attorney Gaelin Bernstein of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the case.

“While the perpetrators may have operated from abroad, their reach was global, and we will continue our efforts to ensure they face justice,” said Supervisory Official Bacon.

The coordinated takedown highlights the growing international collaboration required to combat cybercrime and the global efforts to protect individuals and organizations from sophisticated hacking networks.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...