• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Covert BEC phishing empire targeting Microsoft 365 uncovered

FutureCISO Editors by FutureCISO Editors
September 12, 2023
Photo by cottonbro studio: https://www.pexels.com/photo/hands-typing-on-a-laptop-keyboard-5474294/

Photo by cottonbro studio: https://www.pexels.com/photo/hands-typing-on-a-laptop-keyboard-5474294/

Share on FacebookShare on Twitter

Group-IB followed the development of W3LL, a threat actor responsible for a phishing empire that has mostly gone unnoticed up until now. The Threat Intelligence and Cyber Investigations teams at Group-IB have uncovered that during the past six years, W3LL has been a significant contributor to the compromise of Microsoft 365 business email accounts.

W3LL Store

In Group-IB’s new threat report “W3LL DONE: HIDDEN PHISHING ECOSYSTEM DRIVING BEC ATTACKS”, they discovered that the threat actor established the W3LL Store a covert black market that catered to a closed community of at least 500 threat actors and sold 16 other fully customized tools for business email compromise (BEC) attacks, including attacks on Microsoft 365. In addition, the W3LL Store also sold a custom phishing kit called W3LL Panel, which circumvented MFA.

Between October 2022 and July 2023, over 56,000 corporate Microsoft 365 accounts in the USA, Australia, and Europewere targeted by W3LL’s phishing tools, according to Group-IB investigators. Rough calculations by Group-IB show thatW3LL’s Store’s turnover for the last 10 months may have reached $500,000.

Anton Ushakov

Complex phishing ecosystem

“What really makes W3LL Store and its products stand out from other underground markets is the fact that W3LL created not just a marketplace but a complex phishing ecosystem with a fully compatible custom toolset that covers almost the entire kill-chain of BEC and can be used by cybercriminals of all technical skill levels,” says Anton Ushakov, deputy head of Group-IB's High-Tech Crime Investigation Department, Europe.

Relevant law enforcement organisations have received all the data collected by Group-IB’s cyber investigators and threat intelligence teams about W3LL. 

Related:  The technology sector, the most impersonated industry in brand phishing
Tags: Business Email Compromisecyber attacksGroup-IBphishingthreat actorsW3LL
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses
  • Weak password reuse crisis remains

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl