Microsoft Dismantles Nigerian Phishing Service Raccoon0365 Linked to Thousands of Attacks

Microsoft Dismantles Nigerian Phishing Service Raccoon0365 Linked to Thousands of Attacks

Microsoft has taken down nearly 340 websites tied to Raccoon0365, a fast-expanding Nigerian-based phishing service accused of stealing at least 5,000 Microsoft user credentials. Acting under an order from the U.S. District Court in Manhattan, the company seized domains connected to the operation earlier this month, marking a significant strike against cybercrime networks.

According to Steven Masada, assistant general counsel at Microsoft’s Digital Crimes Unit, Raccoon0365 functioned as a subscription-based service, enabling users to launch large-scale phishing campaigns. Some campaigns involved thousands of emails at once. “Cybercriminals don’t need to be sophisticated to cause widespread harm,” Masada said. “Simple tools like Raccoon0365 make cybercrime accessible to virtually anyone, putting millions of users at risk.”

The service operated primarily through a private Telegram channel with more than 850 subscribers, where customers could pay to impersonate well-known brands and trick victims into entering credentials on fake Microsoft login pages. Since its launch in July 2024, the scheme reportedly generated at least $100,000 in cryptocurrency payments for its operators.

Microsoft identified Nigeria-based Joshua Ogundipe as the leader of Raccoon0365. He did not respond to an email request for comment sent to the address listed in Microsoft’s court filings.

Court documents indicate that Raccoon0365 subscribers have targeted multiple industries, with “a significant portion” of attacks aimed at organizations in New York City. Earlier this year, Microsoft disclosed that the group used tax-themed phishing emails to target over 2,300 organizations in the U.S. between February 12 and February 28.

Healthcare has also been a prime target. Errol Weiss, chief security officer of the Health Information Sharing & Analysis Center (Health-ISAC), a co-plaintiff in the case, confirmed that Raccoon0365 was linked to credential theft at five healthcare organizations and attempted attacks on 25 more. “So many of the attacks start because somebody gave up their user name and password to a bad guy,” Weiss explained. “Once that cybercriminal has access to the network, then it’s just up to the imagination in terms of what comes next and how they monetize it.”

Cloudflare, whose services were used to conceal Raccoon0365’s backend infrastructure, partnered with Microsoft and the U.S. Secret Service to shut down its operations. Blake Darché, head of threat intelligence at Cloudflare, noted that while the operators made “key operational security mistakes,” they remained highly effective. “They’re in people’s accounts, they compromise lots of people, and it needs to obviously be stopped,” he said.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch