Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

      April 15, 2026

      The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

      April 14, 2026

      Silicon Sovereignty: Microsoft’s $10B Play to Secure Japan’s AI Future

      April 14, 2026

      The Rule-Breaker: Why DeepSeek V4 is China’s Defiant Bid for AI Supremacy

      April 13, 2026

      Scheduling Monopoly? Why Nvidia’s SchedMD Deal Alarms Open-Source Devs

      April 13, 2026
    • Crypto

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026
    • Gadgets & Smart Tech
      Featured

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      By preciousMarch 26, 2026
      Recent

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      March 26, 2026

      How ABB and Nvidia are Perfecting Industrial Robotics using AI Simulation

      March 20, 2026

      Neura Robotics Reaches €4B Valuation With Tether Backing

      March 12, 2026
    • Cybersecurity & Online Safety

      Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

      April 16, 2026

      Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

      April 6, 2026

      Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

      April 5, 2026

      Accenture and Anthropic Team Up on AI-powered Cybersecurity

      April 4, 2026

      Your BVN, Passport, and Bank Account May Already Be on the Dark Web. What Every Nigerian Must Do Right Now After the Banking Breaches

      April 4, 2026
    PhronewsPhronews
    Home»Cybersecurity & Online Safety»Microsoft’s Raid on RaccoonO365: 338 Sites Seized and Shut Down
    Cybersecurity & Online Safety

    Microsoft’s Raid on RaccoonO365: 338 Sites Seized and Shut Down

    oluchiBy oluchiSeptember 19, 2025Updated:September 19, 2025No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Image Generated from IT Brief Australia

    On September 15, Microsoft made an official announcement regarding the takedown of the RaccoonO365 phishing service. This operation, dubbed a “raid” in tech circles, highlights the ongoing battle against the phishing-as-a-service (PaaS) platforms that target users and businesses alike.

    Let’s dive into the details of Microsoft’s raid on RaccoonO365 and what it means for online security.

    About Raccoon 365.

    The RaccoonO365 (also tracked as Storm-2246) network offered subscription-based phishing kits to 338 websites. The kits it provided made it easy for low-skill cybercriminals to steal Microsoft 365 usernames and passwords. 

    Mode of Operation 

    RaccoonO365 kits functioned by sending fake Microsoft-branded emails, attachments, and websites to trick users into entering their login details. This allowed the perpetrators to bypass multi-factor authentication (MFA) by capturing session cookies after tricking victims.

    They made use of legitimate internet infrastructure like Cloudflare services plus anti-bot/CAPTCHA protections to evade detection and make their pages look more credible.

    Scope of Operation

    Microsoft reports that RaccoonO365’s kits have stolen at least 5,000 Microsoft credentials from 94 countries since July 2024.

    In the US alone, RaccoonO365 kits targeted 2,300 organizations and at least 20 healthcare organizations, highlighting the significant threat they pose to public safety.

    Cybercriminals used the stolen credentials to commit various crimes, including fraud, extortion, and selling access to victims’ network on the dark web to other malicious actors.

    A Takedown Powered by Law and Tech

    RaccoonO365 was quite different from other phishing platforms due to how it evolved to meet the rising demands of cybercriminals. These upgrades allow its customers to input up to 9,000 target email addresses per day and employ sophisticated techniques to bypass MFA.

    Left to its devices, the group stood the chance of scaling its operations to the point of causing a global malware disaster. This swiftly prompted Microsoft into taking legal action by using a court order granted by the Southern District of New York to seize 338 websites linked to the phishing network.

    Microsoft’s Digital Crimes Unit (DCU) seized 338 websites linked to the operations of the RaccoonO365 phishing service. 

    While Microsoft disrupted the sites, Cloudflare took action by halting all Raccoon365 operations on their platform. Soon Microsoft was able to map the actor’s entire infrastructure, ban all identified domains, put “phish warnings” on some sites, terminate worker scripts, and suspend the user accounts to prevent re-registration.

    On September 8, 2025, Microsoft and Cloudflare had completely taken down RaccoonO365 operations.

    The Master Mind

    During the raid, Microsoft’s DCU was able to identify the leader of the platform to be Joshua Ogundipe, an individual based in Nigeria. The group he led sold subscriptions to its “RaccoonO365 Suite” via a private Telegram channel, which as of August 25, 2025, had 845 members. 

    They provided a tiered pricing model through the channel, structuring offerings to appeal to a range of criminals. Plans sold via the channel included a 30-day plan for $355 and a 90-day plan for $999. The service accepted payments in the form of Bitcoin and USDT.

    According to investigations, the channel generated at least $100,000 in cryptocurrency payments made for subscriptions. 

    Going Forward

    Microsoft has vowed to evolve and continue its legal efforts to dismantle any rebuilt infrastructure from RaccoonO365. The incident has also raised calls for international cooperation via cybercrime laws, cross-border enforcement, and shared intelligence. 

    However, it doesn’t just end with international co-operations and increased efforts in cybersecurity. Users must actively perform their due diligence to protect their digital presence to avoid falling victim to phishing attacks. 

    If you are a user of Microsoft services, take this incident as a reminder to beef up your security practices. Stay informed and stay secure. 

    Cloudflare Cloudflare cybersecurity credential theft crypto payments cybercrime cybercrime takedown operation cybersecurity best practices Cybersecurity News dark web credential sales email phishing attacks 2025 global phishing threats healthcare phishing attack Joshua Ogundipe RaccoonO365 MFA bypass phishing Microsoft 365 phishing attack Microsoft Cloudflare partnership Microsoft Digital Crimes Unit DCU Microsoft RaccoonO365 takedown Microsoft seizure RaccoonO365 online fraud crackdown online security threats phishing as a service PaaS phishing attack prevention phishing kit subscription model phishing law enforcement phishing network shutdown phishing network takedown phishing protection tips phishing scam Nigeria phishing-as-a-service phishing-as-a-service market Raccoon phishing service Raccoon Suite phishing kits Southern District of New York court order stolen Microsoft credentials Storm-2246 phishing kits Telegram cybercrime channels
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    oluchi
    • X (Twitter)
    • LinkedIn

    I am a content writer with over three years of experience. I specialize in creating clear, engaging, and value-driven content across diverse niches, and I’m now focused on the tech and business space. My strong research skills, paired with a natural storytelling ability, enable me to break down complex topics into compelling, reader-friendly articles. As an avid reader and music lover, I bring creativity, insight, and a sharp eye for detail to every piece I write.

    Related Posts

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

    April 6, 2026

    Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

    April 5, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025
    Don't Miss
    Uncategorized

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    By preciousApril 16, 2026

    Data centers are power-hungry by design, but Nvidia wants them to work in the opposite…

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026

    The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

    April 14, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.