Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内,并且不需要特定的开头。首先,我得通读文章,抓住主要信息。 文章讲的是尼日利亚警方逮捕了三名与微软365网络攻击有关的人。他们使用了Raccoon0365钓鱼平台,导致全球组织的数据泄露和财务损失。微软提供了情报,帮助警方行动。警方在 Lagos 和 Edo 州逮捕了他们,并查获了设备。其中一人是 Samuel,他被认为是钓鱼平台的开发者,在 Telegram 上卖工具包。 接下来,我需要把这些要点浓缩成一句话,不超过100字。要包含主要人物、事件、结果和涉及的机构。 可能的结构是:尼日利亚警方逮捕三人,涉及微软365钓鱼攻击,导致全球损失,并查获设备。 这样既简洁又涵盖了关键信息。 </think> 尼日利亚警方逮捕三人,涉嫌利用Raccoon0365钓鱼平台针对微软365发动网络攻击,导致全球组织遭受数据泄露和财务损失。 2025-12-19 19:15:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Nigeria arrests dev of Microsoft 365 'Raccoon0365' phishing platform

The Nigerian police arrested three individuals linked to targeted Microsoft 365 cyberattacks via Raccoon0365 phishing platform.

The attacks led to business email compromise, data breaches, and financial losses affecting organizations worldwide.

The law enforcement operation was possible thanks to intelligence from Microsoft, shared with the Nigeria Police Force National Cybercrime Centre (NPF–NCCC) via the FBI.

Wiz

The authorities identified individuals who administered the phishing toolkit ‘Raccoon0365,’ which automated the creation of fake Microsoft login pages for credential theft.

The service, which was responsible for at least 5,000 Microsoft 365 account compromises across 94 countries, was disrupted by Microsoft and Cloudflare last September.

It is unclear if the disruption operation helped identify those behind Raccoon0365 in Nigeria.

BleepingComputer contacted Microsoft for clarifications but a comment wasn't immediately available.

“Acting on precise and actionable intelligence, NPF–NCCC operatives were deployed to Lagos and Edo States, leading to the arrest of three suspects,” reads the police’s announcement.

“Search operations conducted at their residences resulted in the recovery of laptops, mobile devices, and other digital equipment, which have been linked to the fraudulent scheme after forensic analysis.”

One of the arrested suspects is an individual named Okitipi Samuel, also known online as “RaccoonO365” and “Moses Felix,” whom the police believe is the developer of the phishing platform.

Samuel operated a Telegram channel where he sold phishing kits to other cybercriminals in exchange for cryptocurrency, while he also hosted the phishing pages on Cloudflare using accounts registered with compromised credentials.

The Telegram channel counted over 800 members around the time of the disruption, and the reported access fees ranged from $355/month to $999/3 months.

Cloudflare estimates that the service is used primarily by Russia-based cybercriminals.

Regarding the other two arrested individuals, the police stated they have no evidence linking them to the Raccoon0365 operation or creation.

The person that Microsoft previously identified as the leader of the phishing service, Joshua Ogundipe, is not mentioned in the police’s announcement.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/nigeria-arrests-dev-of-microsoft-365-raccoon0365-phishing-platform/
如有侵权请联系:admin#unsafe.sh