Thursday, April 10, 2025
Homecyber securityNew Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands

New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands

Published on

SIEM as a Service

Follow Us on Google News

The cybercriminal group behind the notorious “darcula-suite” platform has unveiled its latest iteration, darcula 3.0, which introduces groundbreaking capabilities for creating phishing kits targeting any brand globally.

This “Phishing-as-a-Service” (PhaaS) platform lowers the technical barrier for bad actors by automating the cloning of legitimate websites and enabling non-technical users to deploy sophisticated phishing campaigns with ease.

Darcula 3.0 leverages advanced browser automation tools, such as Headless Chrome and Puppeteer, to extract and replicate the assets of any legitimate website.

- Advertisement - Google News

The platform allows users to generate phishing kits by simply inputting a URL, replacing specific HTML elements with phishing content, and customizing forms to mimic branded landing pages.

These kits can then be exported and deployed to target unsuspecting victims.

This innovation marks a significant shift in the phishing landscape, making it easier than ever for criminals to exploit brands that were previously not included in darcula’s pre-built library.

Enhanced Features and Broader Reach

Unlike its predecessor, darcula V2, which offered pre-built phishing kits for over 200 brands, darcula 3.0 introduces on-demand customization capabilities.

This means any brand regardless of its inclusion in previous templates is now vulnerable.

The platform also includes an upgraded admin dashboard that simplifies campaign management for fraudsters.

Darcula 3.0
The darcula-suite admin panel login page

Built with enterprise-grade technologies like Docker, Node.js, and React, the dashboard enables users to monitor stolen credentials, manage active campaigns, and even generate virtual images of stolen credit cards for use in digital wallets.

Netcraft, a leading cybersecurity firm, reports that since March 2024, it has detected and blocked over 90,000 darcula-related domains and taken down more than 20,000 fraudulent websites.

Despite these efforts, the new darcula-suite is expected to amplify the scale of phishing attacks due to its accessibility and efficiency.

Sophisticated Deception Techniques

Darcula 3.0 employs advanced evasion tactics to avoid detection by cybersecurity systems. These include:

  • Unique Deployment Paths: Each phishing campaign is hidden behind randomly generated subdirectories to evade hostname-based detection.
  • IP Filtering: Fraudsters can block specific IP addresses from accessing their content.
  • Crawl Filtering: The platform prevents automated web crawlers from discovering phishing sites.
  • Device-Specific Blocking: Non-mobile devices commonly used for automated detection are often restricted.

These features make it increasingly challenging for traditional detection methods to identify and disrupt malicious campaigns.

With its ability to target any brand globally, darcula-suite poses a significant threat to organizations across industries.

The platform’s integration with Telegram also allows fraudsters to receive real-time notifications when victims fall prey to their scams.

Darcula 3.0
Telegram notification integrations

Additionally, stolen card details can be converted into virtual cards or loaded onto burner phones for resale.

To combat this evolving threat, organizations must adopt advanced detection techniques such as monitoring Certificate Transparency logs, leveraging global proxy networks, and employing non-crawling methods to uncover hidden phishing campaigns.

Netcraft emphasizes that vigilance remains key for consumers as well.

Messages requiring urgent action or offering deals that seem too good to be true should be treated with skepticism.

Both individuals and organizations are encouraged to utilize tools like Netcraft’s anti-phishing apps and services to mitigate risks posed by platforms like darcula-suite.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records

A hacker operating under the alias “Satanic” has claimed responsibility for a massive data...

TP-Link Smart Hub Flaw Exposes Users’ Wi-Fi Credentials

A critical vulnerability has been discovered in TP-Link’s Smart Hub, potentially exposing users’ Wi-Fi...

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...

AkiraBot Floods 80,000 Sites After Outsmarting CAPTCHAs and Slipping Past Network Defenses

AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records

A hacker operating under the alias “Satanic” has claimed responsibility for a massive data...

TP-Link Smart Hub Flaw Exposes Users’ Wi-Fi Credentials

A critical vulnerability has been discovered in TP-Link’s Smart Hub, potentially exposing users’ Wi-Fi...

APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks

Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been...