#LabHost

2025-05-02

The FBI's IC3 released 42,000+ domains tied to LabHost, a major phishing platform dismantled in April 2024.

#FBI #phishing #domain #platform #LabHost

cnews.link/fbi-shares-42000-ph

2025-04-30

Phishing Domains Associated with LabHost PhaaS
#LabHost
ic3.gov/CSA/2025/250429.pdf

🚨 Hunting #SheByte PhaaS Platform: The LabHost Successor
🎯 This #PhaaS targets major banks in Canada and USA, including Interac, delivery services, telecom, toll roads. It also extends to Coinbase, popular email providers like Yahoo, Gmail, and Outlook, and impersonates brands such as Bell, Apple, and Amazon.

Following the #LabHost takedown in early 2024, SheByte operators are working to fill the gap by promoting their platform via Telegram and releasing major updates:
🔹 Geofiltering: prevents access to the phishing page from outside the targeted regions.
🔹 Connection Type Filtering: restricts VPN, hosting, mobile.
🔹 Fingerprint Detection: detects bots and sandboxes.
🔹 Enhanced Control of Page Flow: enables real-time control over the victim’s interaction flow.
🔹 V2 Page Builder: phishing page builder that mimics legitimate sites, adds custom data-stealing forms, and requires no coding skills.

🔗 Execution chain:
Phishing link ➡️ Fake bank login page ➡️ Credential harvesting ➡️ OTP interception ➡️ Security question capture ➡️ Redirect to legitimate bank site

👨‍💻 With #ANYRUN Sandbox, analysts can explore the phishing kit functionality available through the phishkit's admin panel: app.any.run/tasks/56ddc9be-3d3

Explore captured and detonated phishing site samples, most likely created using the SheByte phishing builder:
app.any.run/tasks/2b23cac6-fe3
app.any.run/tasks/6aacde46-d7e
app.any.run/tasks/d39f8b11-b22

🔍 These #phishkits often include data collection forms. Victims are tricked into entering sensitive information, which is sent directly to the attacker. This behavior can be used as a hunting pivot:
🔹 /file/db_connect<digits?>.php + request body parameters: name=
🔹 /t3chboiguru<digits?>.php + request body parameters: usr= psd=

📌 Indicators and patterns for hunting SheByte-related infrastructure:
CSS file hashes:
🔹 SHA256: 58d0a27afc6ed22f356c907579f15f41f120c913c118837dba9c1b8da13a5a4f
🔹SHA256: bc054fd38e88a7c9c1db08bd40dfe7ad366fa23efdce184e372d2adb431c91d2

Reverse DNS reused across multiple phishing-related domains:
🔹 my1[.]bode-panda[.]shop

Favicon of FIRST Bank loaded from a non-legitimate domain:
🔹 SHA256: 6e18a721d5559f569e5a6585bb6430c1965788e4607ea6704601872de8168811
🔹 Legitimate domain: bankatfirst[.]com

A URL request chain with a low number of HTTP requests in the session:
🔹 /personal.html
🔹 /otp.html
🔹 /c.html

#IOCs:
172[.]93[.]121[.]9
162.241[.]71.139
172.93[.]120.134
santosjjax[.]com
ghreo[.]net
cractil[.]net
sitygma[.]net

👨‍💻 SheByte Admin Dashboards:
www[.]lillliiilllliiiiilliilllllllliiii[.]site
jonathanserhan[.]shebyte[.]io

Analyze and investigate the latest #malware and phishing threats with #ANYRUN 🚀

2025-04-17

Excellent investigation by Zataz into Project Nova. The operation is a success. This operation, led by 19 countries, aims to undermine LabHost (shut down in 2024). A 38-year-old British man was arrested and convicted.

Current operations (April 2025) are attempting to target and track the platform's users.

#Zataz #LabHost #Hacking #Spam #Infosec #Cyber #Cybersecurity #Quebec

zataz.com/projet-nova-lempire-

gtbarrygtbarry
2024-04-21

Police take down $249-a-month global phishing service used by 2,000 hackers

Law enforcement officials in 19 countries have shut down an online platform that earned at least $1 million by selling phishing kits to cybercriminals, helping them launch attacks on tens of thousands of people worldwide.

cnn.com/2024/04/18/tech/labhos

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2024-04-20

Global law enforcement cracked down on #LabHost phishing service!

"Operation Nebulae" arrested 32 individuals, including UK masterminds. LabHost ran 40,000 domains, victimizing over 94,000 in Australia.

thehackernews.com/2024/04/glob

#hacking #cybersecurity

Matt Willemsenmattotcha
2024-04-20
2024-04-19

Phishing-as-a-Service (PhaaS) provider LabHost was taken down in an international law enforcement operation on 18 April 2024. Chainalysis maps out LabHost's on-chain activity and use of cryptocurrency. This includes the likely payment of monthly fees by cybercriminals (for LabHost's phishing tools) to identified LabHost cryptocurrency wallets. "LabHost then sent most of those funds to a few mainstream exchanges, presumably to be cashed out, as well as to a popular mixer, likely to launder the funds and obfuscate their origins." LabHost also sent funds to a payment processor (merchant services provider) and an Infrastructure-as-a-Service provider (while not identified, Chainalysis alludes to other criminal organizations using these services for web hosting, email tools, proxy services, etc.). There are links to iSpoof, another illicit provider of tools used for fraud that was shut down by the Metropolitan Police and other law enforcement agencies in 2022. 🔗 chainalysis.com/blog/labhost-d

#LabHost #PhaaS #iSpoof #blockchain #cybercrime #moneylaundering

2024-04-18

#DickeyBetts is now trending across Mastodon

#LabHost is now trending across Mastodon

Tommy Kavanaghancatdubh@mastodon.ie
2024-04-18

#infosec #cybersecurity #labhost

LabHost shut down - local view from #Ireland.

Two arrested by gardaí as part of global operation that shut down phishing platform
thejournal.ie/two-arrested-gar

2024-04-18

Group-IB also participated in the global takdown operation of LabHost Phishing-as-a-Service provider, a sophisticated criminal network offering stolen credit card data for sale. They dive into the operations of LabHost and its subsidiary, LabCVV. LabHost stands out due to its unique business model, which includes not only phishing services but also avenues for monetizing stolen credit cards and banking credentials through services like LabRefund. Grou-IB performs a source code analysis of the phishing template, analysis of cybercrime communications on Telegram and the dark web, of LabSend spam management service, and of LabCVV Card Shop. IOC provided 🔗 group-ib.com/blog/labhost-oper

#LabHost #PhaaS #cybercrime #threatintel #IOC

2024-04-18

Police smash LabHost international fraud network, 37 arrested - Police have successfully infiltrated and disrupted the fraud platform "LabHost", used by ... tripwire.com/state-of-security #guestblog #lawℴ #phishing #labhost

2024-04-18

The Fall of LabHost: Law Enforcement Shuts Down Phishing Service Provider
#LabHost
trendmicro.com/en_us/research/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst