Phishing-as-a-Service Platform LabHost  Is Turned Over

One of the most used phishing-as-a-service platforms, LabHost, has been taken down by an international group of law enforcement authorities co-ordinated by Europol. 

London's Metropolitan Police have  been working with Europol on an operation to infiltrate and close down a website used by more than 2,000 criminals to defraud victims worldwide in their  latest joint operation to tackle large-scale online fraud.  Now, 37 suspects have been arrested as part of the international operation led by Europol, including the original developer of the LabHost service and the LabHost platform is no longer available.

This is a second major blow to cyber crime following the takedown of Lockbit,  another 'managed service' cyber crime operator in February.

Cyber criminals who subscribed to LabHost were sent individualised, 90-second “LabHost Wrapped” videos informing them of the takedown operation as well as recording key evidence against them gathered by law enforcement, including:

  • When the individual first subscribed to LabHost.
  • How long they’ve been a subscriber.
  • How much they’ve paid to LabHost.
  • The number of IP addresses they’ve used to access LabHost
  • The domains they’ve used
  • The various countries and organisations they have targeted

LabHost is believed to have obtained 480,000 card numbers, 64,000 PIN numbers, and no less than one million account passwords. 

The cyber security  company Fortra has closely monitored LabHost in recent years and claims to to have mitigated tens of thousands of phishing attacks carried out by cyber criminals using the platform. Michael Tyler, Senior director of security operations at Fortra's Phish Labs unit commented “The takedown of LabHost by international law enforcement is sending shockwaves through the Phishing as a Service ecosystem... In addition to the high-profile arrests of LabHost operators, Fortra Threat Intelligence is observing other PhaaS platforms competing with LabHost experiencing service instability and suspending their communications and support channels."

LabHost was established up in 2021 and quickly gained a criminal user base. By this year it was operating more than 40,000 fraudulent sites had been created and 2,000 users were registered and paying a monthly subscription fee of  between $250 and $350, many of whom law enforcement officers are now been able to identify. 

The extent of of the data collected by this operation is remarkable and Forta expect numerous arrests as law enforcement uses this data to uncover the real-world identities of the criminals. Some have already been arrested, while others are now the focus of the ongoing investigation.

Phish Labs     |   Phish Labs    |    Europol    |       Metropolitan Police    |     

You Might Also Read: 

$15m Bounty To Identify LockBit Bosses:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Overcoming Security Alert Fatigue
The Evolving Cybersecurity Vulnerability Landscape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.