Article Details

Original Article Text

Click to Toggle View

FBI shares massive list of 42,000 LabHost phishing domains. The FBI has shared 42,000 phishing domains tied to the LabHost cybercrime platform, one of the largest global phishing-as-a-service (PhaaS) platforms that was dismantled in April 2024. The published domains were registered between November 2021 and April 2024, the time of its seizure, and are being shared to increase awareness and provide indicators of compromise. LabHost operations and takedown LabHost was a major PhaaS platform that sold access to an extensive set of phishing kits targeting U.S. and Canadian banks for between $179 and $300 per month. It featured extensive customization options, advanced 2FA-bypassing mechanisms, automatic SMS-based interactions with victims, and a real-time campaign management panel. Though it launched in 2021, it was in late 2023/early 2024 when LabHost turned into one of the major players in the PhaaS market, having surpassed established entities in popularity and attack volume. It is estimated that LabHost has stolen over 1,000,000 user credentials and nearly 500,000 credit card records. In April 2024, a global law enforcement operation backed by investigations in 19 countries led to the dismantling of the platform, which at the time had 10,000 customers worldwide. During the simultaneous searches at 70 addresses, 37 individuals suspected to have links to LabHost were arrested. Although the LabHost operation is no longer active and the shared 42,000 domains are not likely currently used in malicious operations, there's still significant value for cybersecurity firms and defenders. First, the domain list can be used to create a blocklist to mitigate the risk of threat actors recycling or re-registering any of them in future attacks. The list can also be used by security teams to retrospectively scan logs from November 2021 to April 2024 to detect past connections to these domains and identify previously undetected breaches. Ultimately, the list can help cybersecurity professionals analyze domain patterns in PhaaS platforms, aid attribution and intelligence correlation, and provide realistic data for phishing detection model training. The list is shared with a note of caution that it hasn't been validated, so errors may exist. "FBI has not validated every domain name, and the list may contain typographical or similar errors from LabHost user input," explains the FBI. "The information is historical in nature, and the domains may not currently be malicious." The FBI also noted that analysis of this list may reveal additional domains linked to the same infrastructure, so the list may not be exhaustive.

Daily Brief Summary

CYBERCRIME // FBI Releases 42,000 Phishing Domains From LabHost Platform

The FBI has publicized a list of 42,000 phishing domains associated with the LabHost cybercrime platform following its takedown in April 2024.

LabHost, launched in 2021, became a leading phishing-as-a-service provider by late 2023, targeting primarily U.S. and Canadian banks.

The platform offered customized phishing kits with advanced features like two-factor authentication bypass and automatic SMS interactions for $179 to $300 per month.

During its operation, LabHost accrued over 10,000 customers globally and was responsible for the theft of approximately one million user credentials and 500,000 credit card records.

A coordinated international law enforcement operation involving 19 countries culminated in the arrest of 37 individuals connected to LabHost and the platform's shutdown.

The disclosed domains are not currently active in cyber attacks but serve as valuable resources for cybersecurity professionals to enhance defense systems and detect potential past breaches.

The list may contain errors and is not exhaustive, potentially leading to the discovery of further malicious domains linked to the same infrastructure.