Mayura Kathir
2025-09-17 05:15:00
gbhackers.com
Microsoft’s Digital Crimes Unit (DCU) has seized control of 338 websites facilitating RaccoonO365, the rapidly expanding phishing-as-a-service platform that enables anyone to harvest Microsoft 365 credentials.
Acting under a court order from the Southern District of New York, the DCU disrupted the operation’s technical infrastructure, denying cybercriminals access to victims and cutting off their revenue streams.
This action underscores how readily available, subscription-based phishing kits have lowered the barrier to entry for cybercrime, placing millions of users worldwide at heightened risk.
Tracked by Microsoft as Storm-2246, RaccoonO365 offers tiered subscriptions allowing users—regardless of technical expertise—to launch large-scale phishing attacks.
Since July 2024, its clients have stolen at least 5,000 Microsoft credentials across 94 countries. Despite many credential thefts being mitigated by built-in security features, the volume of successful attacks highlights the enduring potency of social engineering.
In one extensive tax-themed campaign, attackers impersonated official tax authorities to ensnare targets and infiltrated over 2,300 organizations in the United States.
Alarmingly, at least 20 U.S. healthcare entities fell victim to these campaigns, jeopardizing patient care by delaying services, corrupting lab results, and exposing sensitive health data—outcomes that could translate into significant financial and human costs.
Technical Sophistication
RaccoonO365’s rapid feature rollouts have kept pace with customer demand. The service now accommodates up to 9,000 target addresses per day and includes tools to bypass multi-factor authentication controls, enabling persistent access once credentials are captured.

The platform’s latest offering, AI-MailCheck, leverages generative AI to craft more convincing emails at scale, further amplifying its threat potential.
Customers can choose from multiple subscription levels, each granting access to branded phishing email templates, spoofed login portals, and automated delivery systems.
Underpinning this operation is a streamlined support channel hosted on Telegram, where over 850 members have engaged and paid at least US$100,000 in cryptocurrency—enough to power hundreds of millions of phishing messages annually.

Investigations led DCU analysts to Nigeria-based developer Joshua Ogundipe, who authored most of RaccoonO365’s code and orchestrated domain registrations using fictitious identities.
An operational security slip—exposing a secret cryptocurrency wallet—enabled Microsoft to attribute and trace illicit funds.
With a criminal referral now sent to international law enforcement, Ogundipe and his associates face legal action aimed at dismantling both current and future infrastructure.
Microsoft’s disruption of RaccoonO365 demonstrates the efficacy of combining legal authority with technical countermeasures.
Collaborating with Cloudflare and Health-ISAC, a non-profit focused on healthcare cybersecurity, the DCU secured takedowns and shared intelligence to protect critical sectors.
To bolster investigations, Microsoft is integrating blockchain analysis tools such as Chainalysis Reactor, enhancing its ability to trace criminal proceeds and build evidence against perpetrators.
Strengthening Defenses
As cybercrime evolves, legal actions alone are insufficient. Governments must harmonize laws, expedite cross-border prosecutions, and close regulatory gaps that cybercriminals exploit.
Meanwhile, organizations and individuals must remain vigilant by enforcing strong multi-factor authentication, deploying up-to-date anti-phishing solutions, and educating users about emerging threat tactics.
This operation exemplifies the power of multi-sector cooperation: technology firms, security vendors, non-profits, and law enforcement working in concert can dismantle sophisticated criminal networks.
By sustaining these partnerships and advancing joint initiatives, the global community can build resilience against the next generation of accessible, AI-enhanced cyber threats.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.