Microsoft has launched a significant offensive against cybercrime by seizing more than 240 fraudulent websites linked to an Egypt-based cybercrime facilitator known online as "MRxC0DER." This operation, named ONNX, was a major player in the phishing-as-a-service (PhaaS) market, offering do-it-yourself phishing kits to cybercriminals globally. The kits were used to target companies and individuals across various sectors, with a particular focus on the financial industry, stealing user credentials and bypassing security measures.
The crackdown was part of a concerted effort by Microsoft's Digital Crimes Unit (DCU) to disrupt cybercrime and protect customers from downstream threats like financial fraud, data theft, and ransomware. The operation came to light through Microsoft's Digital Defense Report, which identified ONNX as the top Adversary in the Middle (AitM) phishing service by email volume during the first half of 2024.
Abanoub Nady, the alleged operator behind ONNX, developed and sold these kits under the fraudulent ONNX brand, which is actually a legitimate trademark owned by the Linux Foundation for an open-source machine learning platform. Microsoft, in collaboration with the U.S. Department of Justice and the Linux Foundation, obtained a civil court order in the Eastern District of Virginia to redirect the malicious website infrastructure to their control, effectively halting the operation.
The fraudulent ONNX operation had been active since at least 2017, offering various subscription models ranging from $150 to $550 monthly. These kits were marketed and sold through online storefronts and social media platforms like Telegram, where cybercriminals could access tutorials and technical support to orchestrate sophisticated phishing campaigns. The kits were particularly notorious for enabling attacks that could bypass two-factor authentication (2FA) by intercepting 2FA requests.
Recent months saw an uptick in these attacks, with a notable increase in QR code phishing (quishing) tactics, where malicious QR codes were embedded in PDF attachments, directing victims to fake login pages. The financial sector, given its handling of sensitive data and transactions, was the primary target, though other sectors were not immune to these attacks.
Microsoft's action against ONNX is part of a broader strategy to target the infrastructure of cybercrime operations. This approach not only disrupts current activities but also aims to deter future cybercriminals by increasing the difficulty and cost of engaging in such illicit activities. The tech giant has been proactive in this regard, having previously disrupted other cybercrime operations like Storm-1152 and Russian ColdRiver FSB hackers' attack infrastructure.
The threat actor takedown of ONNX sends a strong message to the cybercriminal community: Microsoft will not stand idly by while its services and customers are exploited. This operation underscores the importance of collaboration between tech companies, law enforcement, and industry partners to combat cybercrime effectively. It also highlights the evolving nature of cyber threats, urging organizations and individuals to stay vigilant and employ robust security measures.
While the disruption of ONNX is a significant victory, Microsoft acknowledges that other threat actors will likely fill the void left by this operation. However, this proactive stance by Microsoft, through legal and technical strategies, aims to have a lasting impact on the cybercrime landscape, making it a more challenging environment for malicious actors to operate in.
This operation is particularly relevant for those in the cybersecurity field, offering insights into the methods used by cybercriminals and the comprehensive strategies employed to mitigate such threats. It reinforces the need for continuous vigilance and adaptation in cybersecurity practices to protect against the ever-evolving tactics of cybercriminals.
Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.