Police arrest seller of JokerOTP MFA passcode capturing tool
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要特定的开头,直接写文章描述即可。 首先,我得通读整篇文章,抓住主要信息。文章讲的是荷兰警方逮捕了一名21岁的男子,他涉嫌出售JokerOTP钓鱼工具的访问权限。这个工具可以拦截一次性密码,用于劫持账户。JokerOTP是一个作为服务的钓鱼平台,在两年内导致超过28,000次攻击,涉及13个国家,造成至少1000万美元的损失。 接下来,我需要提取关键点:逮捕行动、嫌疑人身份、JokerOTP的功能、造成的损失、以及警方的调查进展。同时,要注意用简洁的语言表达这些信息。 然后,我要确保总结在100字以内。可能需要合并一些信息,比如将“两年内导致至少1000万美元损失”简化为“造成超28,000次攻击和约1千万美元损失”。 最后,检查语言是否流畅自然,没有语法错误,并且符合用户的要求。 </think> 荷兰警方逮捕一名21岁男子,涉嫌出售JokerOTP钓鱼工具访问权限。该工具可拦截一次性密码(OTP),用于劫持账户。JokerOTP作为服务的钓鱼平台,在两年内造成超28,000次攻击和约1千万美元损失。 2026-2-11 19:15:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Police arrest seller of JokerOTP MFA passcode capturing tool

The Netherlands Police have arrested a a 21-year-old man from Dordrecht, suspected of selling access to the JokerOTP phishing automation tool that can intercept one-time passwords (OTP) for hijacking accounts.

The suspect is the third one arrested after authorities after a three-year investigation that led to dismantling the JokerOTP phishing-as-a-service (PhaaS) operation in April 2025.

At the time, authorities arrested the developer of the platform, and in August, a co-developer who used the aliases 'spit' and 'defone123'.

Wiz

In two years, the JokerOTP malicious service allegedly caused at least $10 million in financial losses in more than 28,000 attacks targeting users in 13 countries.

The seller, whose name has not been disclosed, used a Telegram account to advertise access to the phishing platform via license keys.

Cybercriminals subscribed to the service could configure the tool to automate calls to victims and capture temporary codes or other sensitive data (PIN codes, card data, social security numbers).

The JokerOTP bot could target users of PayPal, Venmo, Coinbase, Amazon, and Apple.  

Commands for the JokerOTP bot
source: vxdb

OTPs are temporary codes serving as an additional security layer in account authentication. They can be sent via SMS or email, or generated by a specialized application, when users try to log into an account.

These codes have short expiration times and are meant to ensure that access to an account is reserved only to the rightful owner, blocking fraudulent attempts from actors who might have stolen or guessed (brute-forced) the credentials.

Typically, cybercriminals would use stolen credentials, either collected from malware infections or purchased on the dark web, and try to log into a target account. The legitimate owner would receive the OTP required for completing the login process.

At the same time, JokerOTP automated calls to targets, posing as representatives of the legitimate service the attackers were attempting to access, and requesting the one-time password (OTP).

Because the calls coincided with the delivery of the authentication code, many users failed to recognize the scam.

“Victims were automatically called by the bot and informed that criminals were attempting to gain access to their account,” explained Anouk Bonekamp, team leader of Cybercrime Oost-Brabant.

“The bot then asked them to enter the one-time password. Victims, therefore believe they are protecting themselves by cooperating and providing information.”

Depending on the type of compromised account, threat actors may use their access to make unauthorized purchases, transfer funds to bank accounts they control, or hijack the account.

The police say the investigation is still underway, and dozens of JokerOTP bot buyers in the Netherlands have already been identified and will be prosecuted in due time.

Bonekamp further commented that victims of such scams should not feel ashamed for falling for the sophisticated trap and should stay alert for signs of fraud, such as the creation of urgency and requests to disclose sensitive info like PINs and passwords.

The police also suggest that users check for data breaches impacting them on the Have I Been Pwned and Netherland Politie's CheckJack services, as the leak of emails and other sensitive data significantly increases the risk of being targeted by tools like JokerOTP.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/police-arrest-seller-of-jokerotp-mfa-passcode-capturing-tool/
如有侵权请联系:admin#unsafe.sh