US disrupts multimillion-dollar bank account takeover operation targeting Americans

The U.S. Justice Department said it seized a web domain and database that were used to siphon millions of dollars from Americans’ bank accounts through an online fraud scheme that exploited search engine advertising.

According to investigators, the website, web3adspanels.org, functioned as a control panel for criminals carrying out so-called bank account takeover fraud, allowing them to store and manage stolen banking credentials harvested from victims across the United States.

The FBI has identified at least 19 victims so far, including two companies in Georgia, with attempted losses totaling about $28 million and confirmed losses of roughly $14.6 million. 

Visitors to the seized site are now greeted with a law enforcement splash page announcing the takedown. Officials said cutting off access to the domain disrupts the criminals’ ability to exploit stolen credentials and steal additional funds.

The group behind the scheme bought fraudulent ads on major search engines, including Google and Bing, designed to closely mimic legitimate sponsored links from well-known banks. Users who clicked on the ads believed they were being directed to their bank’s website but were instead routed to counterfeit pages controlled by the criminals.

When victims entered their login information, malicious code embedded in the fake sites captured the credentials. The attackers then used that information to access real bank accounts and drain funds, the Justice Department said Monday.

Investigators said the seized domain hosted login credentials for thousands of victims and continued to support the fraud operation as recently as November 2025.

The seizure is part of a broader U.S. government crackdown on bank account takeover fraud, which has surged nationwide. Since January 2025, the FBI’s Internet Crime Complaint Center has received more than 5,100 complaints tied to such schemes, with reported losses exceeding $262 million.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Next Post

SEC sues crypto firms for defrauding investors out of $14 million

Related Posts

New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise

For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the single largest uncontrolled channel for corporate data
Read More

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East after it was publicly disclosed and patched in July 2025. Also targeted were government departments in an African country, as well as government agencies in South America, a university in the U.S., as well as likely a state technology
Read More

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. "The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access," AhnLab Security Intelligence Center (ASEC) said in a report published last week. "They then used PowerCat, an open-source
Read More