Microsoft’s Digital Crimes Unit (DCU) has taken down a cybercrime service referred to as RaccoonO365. The corporate introduced on September 16 that, via a court docket order granted by the Southern District of New York, it seized 338 web sites linked to the RaccoonO365 operation, which was a preferred device for criminals trying to steal consumer data.
RaccoonO365, which Microsoft tracks as Storm-2246, supplied a subscription service that permit anybody, even these with out technical abilities, steal Microsoft 365 usernames and passwords, often known as credentials. The service supplied phishing kits, that are ready-to-use instruments that mimic official Microsoft communications to trick folks into giving up their data.
Since July 2024, the service has been used to steal at the very least 5,000 Microsoft credentials from victims in 94 international locations, together with a large tax-themed marketing campaign that focused over 2,300 organisations in the US. Whereas not each theft results in a full system break-in, the massive variety of assaults exhibits the scale of the issue.
A Menace to Public Well being
The consequences of RaccoonO365 have reached past easy information theft. Some of the worrying makes use of of the service was a large-scale phishing marketing campaign that focused at the very least 20 US healthcare organisations.
Since phishing emails usually result in extra severe assaults like ransomware, these incidents put public security in danger by delaying affected person companies and exposing delicate information. For this reason the DCU partnered with Well being-ISAC, a non-profit centered on cybersecurity for the well being sector, to file the lawsuit.
The Man Behind the Crime
In the course of the investigation, the DCU recognized the operation’s chief as Joshua Ogundipe, a person from Nigeria. He and his companions labored collectively to create, promote, and help the service. They offered their companies on the messaging app Telegram, the place that they had greater than 850 members and acquired at the very least $100,000 in cryptocurrency funds.
The group additionally lately started promoting a brand new AI-powered service, RaccoonO365 AI-MailCheck, designed to make their assaults much more efficient. Microsoft believes that Ogundipe wrote many of the laptop code for RaccoonO365.

The group was cautious to cover their identities, however a mistake revealed a secret cryptocurrency pockets, which helped the DCU join Ogundipe to the operation. The details about Ogundipe has now been despatched to worldwide regulation enforcement for additional motion.
Working Collectively to Battle a World Drawback
The operation exhibits how cybercrime is now accessible and scalable to just about anybody. As Microsoft notes, “Cybercriminals don’t should be subtle to trigger widespread hurt,” nevertheless, this motion sends “a transparent sign that Microsoft and its companions will stay persistent in going after those that goal our techniques.”
To confront this, Microsoft is utilizing new strategies like blockchain evaluation device Chainalysis Reactor that traces cryptocurrency funds and identifies criminals. The corporate additionally regularly collaborates with safety companies like Cloudflare to shortly take down malicious web sites.
Professional Commentary:
Including to the technical options, specialists spotlight the essential position of human defences on this combat. Erich Kron, a safety consciousness advocate at KnowBe4, commented that “electronic mail phishing continues to be a serious risk that organisations face every day.” He defined that phishing companies make it far simpler for criminals who aren’t tech-savvy to get into the “cybercrime recreation.”
Kron identified that credential theft might be particularly harmful as a result of “folks are likely to reuse passwords throughout totally different accounts and companies,” that means an attacker who steals one password would possibly acquire entry to many extra accounts.
To counter this, he mentioned, organisations want a “well-established human threat administration (HRM) program in place” to teach customers on the way to spot pretend login pages and perceive the risks of reusing passwords. In the end, he advises, “MFA needs to be deployed wherever doable to make issues even harder for attackers within the occasion they do steal somebody’s credentials.”