Malaysian regulation enforcement authorities have introduced the takedown of a phishing-as-a-service (PhaaS) operation known as BulletProofLink.
The Royal Malaysia Police stated the hassle, which was carried out with help from the Australian Federal Police (AFP) and the U.S. Federal Bureau of Investigation (FBI) on November 6, 2023, was primarily based on info that the risk actors behind the platform have been primarily based overseas.
To that finish, eight people aged between 29 and 56, together with the syndicate’s mastermind, have been arrested throughout totally different places in Sabah, Selangor, Perak, and Kuala Lumpur, New Straits Instances reported.
Together with the arrests, authorities confiscated servers, computer systems, jewellery, autos, and cryptocurrency wallets containing roughly $213,000.
BulletProofLink, additionally known as BulletProftLink, is thought for providing ready-to-use phishing templates on a subscription foundation to different actors for conducting credential harvesting campaigns. These templates mimic the login pages of well-known providers like American Categorical, Financial institution of America, DHL, Microsoft, and Naver.
Based on an evaluation from Microsoft in September 2021, BulletProofLink actors additionally engaged in what’s known as double theft whereby the stolen credentials are despatched to each their clients and the core builders, leading to further monetization avenues.
“BulletProftLink is related to the risk actor AnthraxBP who additionally glided by the net nicknames TheGreenMY and AnthraxLinkers,” cybersecurity agency Intel 471 stated final week.
“The actor maintained an lively web site promoting phishing providers. The actor has an in depth underground footprint and operated on quite a few clear internet underground boards and Telegram channels utilizing a number of handles.”
Believed to be lively since not less than 2015, BulletProftLink’s on-line storefront is estimated to have a minimum of 8,138 lively purchasers and 327 phishing pages templates as of April 2023.
One other noteworthy characteristic is its integration of the Evilginx2 to facilitate adversary-in-the-middle (AiTM) assaults that make it attainable for risk actors to steal session cookies and bypass multi-factor authentication protections.
“PhaaS schemes like BulletProftLink present the gas for additional assaults,” Intel 471 stated. “Stolen login credentials are one of many major ways in which malicious hackers achieve entry to organizations.”
In an indication that risk actors are continually updating ways in response to disruptions and taking extra subtle approaches, AiTM assaults have additionally been noticed using middleman hyperlinks to paperwork hosted on file-sharing options like DRACOON that include the URLs to adversary-controlled infrastructure.
“This new technique can bypass e-mail safety mitigations for the reason that preliminary hyperlink seems to be from a reliable supply and no recordsdata are delivered to the sufferer’s endpoint because the hosted doc containing the hyperlink could be interacted with by way of the file-sharing server throughout the browser,” Development Micro stated.
The event comes as a 33-year-old Serbian and Croatian nationwide, Milomir Desnica, pleaded responsible within the U.S. to working a drug trafficking platform known as Monopoly Market on the darkish internet and for conspiring to distribute over 30 kilograms of methamphetamine to U.S. clients.
The illicit market, which was arrange by Desnica in 2019, was taken offline in December 2021 as a part of a coordinated train in partnership with Germany and Finland. Desnica was arrested in Austria in November 2022 and extradited to the U.S. to face drug trafficking fees in June 2023.



