Blog Post | Red Rabbit Security

In a major win against cybercrime, Malaysian law enforcement, in collaboration with the Australian Federal Police and the FBI, successfully dismantled the notorious phishing-as-a-service (PhaaS) operation known as BulletProofLink on November 6, 2023. The operation resulted in the arrest of eight individuals, including the syndicate's mastermind, and the seizure of servers, computers, jewelry, vehicles, and cryptocurrency wallets containing approximately $213,000.

Major PhaaS Takedown

International law enforcement dismantled BulletProofLink, a phishing-as-a-service operation active since 2015, arresting 8 cybercriminals and seizing $213K in cryptocurrency. The platform facilitated credential theft through 327 phishing templates serving 8,138 active criminal subscribers.

Unveiling BulletProofLink's Phishing Empire: A Deep Dive

BulletProofLink, also known as BulletProftLink, has been operating since at least 2015, offering ready-to-use phishing templates on a subscription basis. These templates, mimicking the login pages of reputable services such as American Express, Bank of America, DHL, Microsoft, and Naver, were a favorite among cybercriminals conducting credential harvesting campaigns.

8
Arrests Made
$213K
Crypto Seized
8,138
Active Clients
327
Phishing Templates

The phishing-as-a-service model adopted by BulletProofLink allowed threat actors, including AnthraxBP and TheGreenMY, to subscribe to their services, resulting in an estimated 8,138 active clients and 327 phishing page templates as of April 2023.

BulletProofLink's Phishing-as-a-Service Offerings

  • Ready-to-Use Templates: Pre-designed phishing pages mimicking legitimate login pages
  • Subscription Model: Criminals paid regular fees for continued access to templates
  • Target Services: American Express, Bank of America, DHL, Microsoft, Naver
  • Massive Client Base: Over 8,100 active criminal subscribers worldwide
  • Template Library: 327 different phishing page templates available
  • Notable Customers: AnthraxBP, TheGreenMY, and other threat actors

Double Theft Tactics and Advanced Techniques

BulletProofLink's actors were known for employing a double theft strategy, sending stolen credentials both to their customers and core developers, creating multiple monetization avenues. Additionally, the integration of the Evilginx2 phishing kit facilitated adversary-in-the-middle (AiTM) attacks, enabling the theft of session cookies and bypassing multi-factor authentication.

Advanced Phishing Techniques Employed

  • Double Theft Strategy: Credentials sent to both paying customers and BulletProofLink operators
  • Multiple Monetization: Stolen credentials sold to clients while also used by operators
  • Evilginx2 Integration: Advanced phishing kit for adversary-in-the-middle attacks
  • Session Cookie Theft: Bypassing multi-factor authentication through session hijacking
  • Credential Harvesting: Automated collection of usernames and passwords
  • MFA Bypass Capability: Defeating two-factor and multi-factor authentication

Evolving Adversary-in-the-Middle Tactics

However, the cyber threat landscape is dynamic, with actors constantly evolving their tactics. Recent developments reveal AiTM attacks are now utilizing intermediary links hosted on file-sharing solutions like DRACOON. This sophisticated approach bypasses traditional email security measures, as the initial link appears legitimate and the victim interacts with the hosted document within the browser.

Protect Your Organization from Phishing

Don't let phishing attacks compromise your credentials and data. Get expert guidance on implementing comprehensive anti-phishing defenses and security awareness training.

Schedule Free Security Assessment

Fueling Further Attacks: The Role of PhaaS

The BulletProofLink takedown highlights the critical role PhaaS operations play in cybercrime. Stolen login credentials remain a primary means for malicious hackers to gain unauthorized access to organizations, underscoring the urgency for robust cybersecurity measures.

Phishing-as-a-Service platforms have lowered the barrier to entry for cybercriminals, enabling individuals with limited technical expertise to launch sophisticated phishing campaigns. This democratization of cybercrime tools has contributed to the exponential growth in phishing attacks globally.

The Broader Impact of Phishing-as-a-Service

  • Lowered Entry Barriers: Non-technical criminals can launch sophisticated attacks
  • Scaled Operations: Single platforms enable thousands of concurrent phishing campaigns
  • Credential Economy: Stolen credentials fuel ransomware, data breaches, and fraud
  • Enterprise Risk: Organizations face constant credential harvesting attempts
  • Supply Chain Attacks: Compromised credentials enable downstream attacks
  • Multi-Vector Threats: Credentials used for initial access, then lateral movement

Looking Ahead: The Fight Against Cybercrime Continues

While this victory against BulletProofLink is commendable, it serves as a reminder that cyber threats persist and adapt. Law enforcement agencies globally must remain vigilant, and organizations need to bolster their cybersecurity postures to stay one step ahead of evolving cybercriminal tactics.

In a landscape where the dark web's underbelly is constantly shifting, collaborative efforts, technological advancements, and heightened cybersecurity awareness are crucial in the ongoing battle against cybercrime. The BulletProofLink takedown marks a significant stride, but the journey to a more secure digital environment continues.

Critical Takeaways

The successful dismantling of BulletProofLink demonstrates that international law enforcement cooperation can effectively combat cybercrime infrastructure, even when operations span multiple jurisdictions. The arrest of 8 individuals and seizure of $213K in cryptocurrency sends a clear message that PhaaS operators will be held accountable.

However, the existence of 8,138 active criminal subscribers and 327 phishing templates highlights the massive scale of the phishing threat. Organizations must recognize that phishing remains the number one attack vector and invest in comprehensive defenses including email security, security awareness training, multi-factor authentication, and incident response capabilities.

About Red Rabbit Security: We're a leading cybersecurity firm specializing in anti-phishing defenses, security awareness training, and email security solutions. Our team of certified experts helps organizations implement comprehensive phishing protection programs, conduct simulated phishing campaigns, and respond to credential compromise incidents.

TOP 250 MSPs

OUTSMART OUTPACE OUTLAST

TOP 200 MSSP 2024

Subscribe to our Monthly Cybersecurity Threats and Attacks Newsletter