FBI and Indonesian authorities dismantled the 'W3LL' phishing platform, seizing infrastructure and arresting the developer. The platform facilitated over $20M in fraud and the sale of 25,000+ compromised accounts. The kit targeted Microsoft 365 using adversary-in-the-middle attacks to bypass MFA.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|---|---|---|
| Domain |
w3ll[.]store
|
Seized domain used for the W3LL phishing platform | T1566|T1071.001 |
| Code | Title |
|---|---|
| T1566.002 | Spearphishing Link - Used to deliver the phishing attacks |
| T1071.001 | Application Layer Protocol: Web Protocols - Web Protocols - The phishing kit used web protocols |
| T1552.003 | Pass-the-Cookie - Using session cookies to bypass authentication |
| T1090.001 | Internal Proxy - Adversary-in-the-middle suggests internal proxying |
| T1078 | Valid Accounts - Using compromised accounts for access |
| T1098 | Account Manipulation - Creating email rules for persistence |
| T1190 | Exploit Public-Facing Application - Targeting web-based login portals |
| T1204 | User Execution - Victims executing the phishing attack |
| T1553 | Subvert Trust Controls - Bypassing MFA |
| Type | Value |
|---|---|
| Company | Microsoft 365 users |
| Sector | Businesses |
| Sector | Financial Services |
The FBI Atlanta Field Office and Indonesian authorities have dismantled the "W3LL" global phishing platform, seizing infrastructure and arresting the alleged developer in what is described as the first coordinated enforcement action between the United States and Indonesia targeting a phishing kit developer. The W3ll Store was a phishing kit and online marketplace that enabled cybercriminals to steal thousands of credentials and attempt more than $20 million in fraud. "This Website Has Been Seized as part of a coordinated law enforcement action taken against W3LL STORE," reads a seizure message on
Between 2023 and 2024, the phishing kit was used to target more than 17,000 victims worldwide, with investigators finding that the developer collected and resold access to compromised accounts. The W3LL phishing platform was previously linked to campaigns targeting Microsoft 365 corporate accounts and was designed to support business email compromise (BEC) attacks from initial access through post-exploitation. The phishing kit relied on adversary-in-the-middle attacks, which is when legitimate login portals are proxied through an attacker's infrastructure. This allows the threat actors to monitor for and intercept credentials, one-time MFA passcodes, and session cookies in real time. These session cookies could then be used to log into the compromised accounts without triggering MFA authentication challenges. Once access was obtained, attackers would monitor inboxes, create email rules, and impersonate victims to commit invoice fraud and redirect payments in BEC attacks.