In a coordinated operation between the FBI and the Indonesian National Police, an infrastructure used by a global phishing network has been cut off at the root, which is a major blow to those who sold tools to supplant access pages and steal credentials. In addition to blocking key domains, the authorities arrested the alleged developer known for his initials G.L., in an action that aims to stop both the availability of software and the massive resale of committed accounts.
The central part of this network was a kit marketed as W3LL, a package that made it easier for criminals to set up fake sites that imitated legitimate portals and thus deceive users to deliver user and password. Because of its design and facilities, W3LL was not limited to an isolated script: it offered an ecosystem - including management panels, mailing lists and access to already committed servers - that turned phishing into a turnkey service. Previous investigations, including those published by the firm Group-IB, documented the existence of this clandestine store and explained how the kit was marketed and distributed to hundreds of malicious actors.

According to the authorities, the platform had been monetized through direct sales for approximately $500 per licence, and it also acted as a market where stolen credentials and remote access were exchanged. Between 2019 and 2023 tens of thousands of accounts would have been negotiated in this environment, and only in the last part of the operation is it estimated that thousands of victims were directly targeted by the system.
Beyond the theft of passwords, W3LL incorporated more sophisticated techniques to evade modern protections: it used what the community calls adverse-in-the-middle to intercept session cookies and thus remove enhanced authentication measures. This greatly increased the risk for corporate environments, where access to a Microsoft 365 account, for example, can allow mail-supplanting fraud or data exfiltration. Technical reports published by security specialists have detailed how these capabilities became a regular vector for corporate mail and other fraud engagement attacks.
The economic and human magnitude of the matter was significant In addition to fraud attempts over $20 million, W3LL-related platforms were involved in the marketing of tens of thousands of committed accounts and the direct impact of a large number of victims around the world in the recent period. Even when the original store closed in 2023, those responsible continued to offer the tool and its services through encrypted channels and private groups, which extended the damage until its most recent disarticulation.
To understand the technical and criminal impact of this network, it is useful to refer to research published by specialized companies. Group-IB documented the origins and structure of the underground store where W3LL was offered, while other analyses have shown how the code and ideas of this kit have been reused or "cracked" in other phishing tools, such as some variants that sought to avoid authentication in two factors. More recent reports from security firms describe exact session capture tactics and preferred guidance on cloud service credentials.
The action of the law enforcement agencies highlights two clear lessons: on the one hand, that international cooperation between agencies is increasingly indispensable to respond to threats that operate without borders; on the other, that the criminal business model that sells phishing as a service facilitates the scalability of the damage, because it allows attackers with little technical knowledge to launch campaigns with tools already packed. Official statements emphasize that neutralizing technical facilities - panels, domains and developers - directly reduces the ability of many criminals to access other people's accounts.
For users and administrators, the episode renews practical measures: monitoring unusual access alerts, forcing critical password rotation, implementing and reviewing protocol-based multi-factor authentication configurations that cannot be easily hijacked by AitM, and monitoring accounts with proactive detection tools. It is also recommended to review communications that ask for credentials, especially those that simulate known senders or portals, and always check the URL and certificates before entering sensitive data.

The research also has a preventive component: by removing kits such as W3LL from the market and closing distribution channels, authorities try to limit the supply of "phishing-as-a-service." However, experts note that the closure of an infrastructure often leads to modified versions or the emergence of similar new products, so that continuous monitoring and collaboration between the private and public sectors remain essential.
Those who want to deepen the technical details and background of this family of kits can consult the analyses published by cybersecurity firms that have followed the development of the W3LL ecosystem and related tools. Among the useful readings are the reports and blogs of Group-IB, which documented the store and its catalogue of services, research on variants and reuses of code by other tools, as well as specialized publications that have covered the intervention of the authorities and their implications. For more context and technical perspectives, see Group-IB's work on W3LL ( Group-IB: W3LL analysis), reports comparing phishing kits and AitM techniques ( Sekoia: Variant analysis and evasion) and technical analysis published by companies monitoring committed credentials and fraud in cloud services ( Hunt.io: investigations into session theft and MFA). It is also recommended to follow the official communications of the security forces in order to know the progress of the case and the measures taken by the investigators ( FBI - Communications and News).
In short, the disarticulation of the infrastructure associated with W3LL is an operational victory, but it does not completely eliminate a wider problem: as long as there is a market for the purchase of credentials and ease to offer phishing as a service, new tools and actors will appear. The response will require both legal and technical actions and increased awareness and safety practices by companies and users.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...