Saturday, May 24, 2025
Homecyber securityDarcula PhaaS: 884,000 Credit Card Details Stolen from 13 Million Global User...

Darcula PhaaS: 884,000 Credit Card Details Stolen from 13 Million Global User Clicks

Published on

SIEM as a Service

Follow Us on Google News

The Darcula group has orchestrated a massive phishing-as-a-service (PhaaS) operation, dubbed Magic Cat, compromising an estimated 884,000 credit card details from over 13 million user interactions worldwide.

This smishing (SMS phishing) campaign, first detected in December 2023, impersonates trusted brands like the Norwegian Postal Service to lure victims into divulging sensitive information.

Sophisticated Phishing-as-a-Service Operation

By exploiting mobile-specific vulnerabilities and deploying advanced anti-forensics techniques, the operation has demonstrated a chilling level of sophistication, targeting millions through SMS, iMessage, and RCS platforms with messages prompting users to update delivery details or pay fictitious fees.

- Advertisement - Google News
Darcula PhaaS
Not Found message.

The Magic Cat software, uncovered through meticulous reverse-engineering by security researchers, is a feature-rich PhaaS platform designed for non-technical operators to launch phishing campaigns at scale.

It supports impersonation of hundreds of global brands with customizable templates, streams victim data in real-time for immediate exploitation, and integrates seamlessly with SMS gateways for mass distribution.

Technical Depth of the Magic Cat Platform

Researchers bypassed the platform’s anti-forensic measures-such as mobile-only access restrictions and client-side encryption using the Rabbit algorithm via crypto-js-by manipulating User-Agent headers and leveraging cellular network simulations.

Darcula PhaaS
Node.js library

Further investigation revealed encrypted communications via Socket.IO, with data obfuscated through Base64 encoding and MD5 hashing, protecting the phishing protocol from prying eyes.

Shockingly, a potential backdoor in the software’s HTTP request handling was identified, allowing unauthorized access to administrative functions, raising questions about developer intent or oversight.

By deobfuscating backend code with tools like Synchrony, researchers activated an unlicensed copy of Magic Cat in a controlled environment, exposing its full capabilities, including license generation and operator dashboards that facilitate real-time victim interaction.

The Darcula operation, linked to a Chinese-based Telegram group, showcases a professional setup with servers, SIM cards, and devices for mass phishing, alongside brazen displays of illicit gains.

Tracing Darcula’s identity through IP addresses, Passive DNS records, and OSINT tools led to connections with Alibaba Cloud VMs, GitHub profiles, and Chinese phone numbers, culminating in a name tied to Telegram document metadata.

This investigation, reported to law enforcement in January 2024 and shared with Norwegian media, underscores the urgent need for collaborative action from financial institutions, tech giants, and mobile operators to combat such pervasive cyber threats, as Darcula’s low-profile mastermind continues to evade full identification while profiting from global deception.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...