HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

FBI and Indonesian Police Dismantle W3LL Phishing Kit Used to Harvest 56K Microsoft 365 Credentials

The FBI and Indonesian authorities seized the W3LL phishing infrastructure and arrested its developer, ending a service that sold fake Microsoft 365 login portals for $500 and compromised over 56 000 corporate accounts worldwide. TPRM teams must reassess MFA controls and third‑party SaaS risk.

🛡️ LiveThreat™ Intelligence · 📅 April 14, 2026· 📰 therecord.media
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
3 recommended
📰
Source
therecord.media

FBI and Indonesian Police Dismantle W3LL Phishing Kit Used to Harvest 56K Microsoft 365 Credentials

What Happened – Law‑enforcement agencies in the United States (FBI‑Atlanta) and Indonesia seized the infrastructure behind the W3LL phishing platform and arrested its alleged developer. The kit, sold for as little as $500, enabled threat actors to create convincing Microsoft 365 login pages that bypassed MFA and harvested credentials at scale.

Why It Matters for TPRM

  • The service supplied fully‑customized phishing and BEC tools to a closed community of ~500 actors, amplifying credential‑theft risk for any third‑party with Microsoft 365 integrations.
  • Over 56 000 corporate accounts across the US, UK, Australia and Europe were targeted, exposing sensitive business data and increasing fraud exposure.
  • The takedown demonstrates that threat‑actor marketplaces can persist beyond official shutdowns via encrypted channels, requiring continuous monitoring.

Who Is Affected – Enterprises that rely on Microsoft 365, SaaS providers, financial services, healthcare, education, and any organization that outsources identity management.

Recommended Actions

  • Review all third‑party contracts that involve Microsoft 365 or other cloud‑based authentication services.
  • Verify that vendors enforce MFA that cannot be bypassed by captured credentials (e.g., hardware tokens, conditional access).
  • Conduct credential‑theft simulations and update incident‑response playbooks for phishing‑derived breaches.

Technical Notes – The W3LL kit generated fake login portals, captured usernames/passwords, and leveraged those credentials to bypass MFA, enabling long‑term account access. No specific CVE was involved; the threat stemmed from a phishing‑as‑a‑service model and a marketplace (W3LLSTORE) that sold compromised accounts. Source: The Record

📰 Original Source
https://therecord.media/phishing-takedown-indonesia-fbi

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.