US disrupts multimillion-dollar bank account takeover operation targeting Americans

The U.S. Justice Department said it seized a web domain and database that were used to siphon millions of dollars from Americans’ bank accounts through an online fraud scheme that exploited search engine advertising.

According to investigators, the website, web3adspanels.org, functioned as a control panel for criminals carrying out so-called bank account takeover fraud, allowing them to store and manage stolen banking credentials harvested from victims across the United States.

The FBI has identified at least 19 victims so far, including two companies in Georgia, with attempted losses totaling about $28 million and confirmed losses of roughly $14.6 million. 

Visitors to the seized site are now greeted with a law enforcement splash page announcing the takedown. Officials said cutting off access to the domain disrupts the criminals’ ability to exploit stolen credentials and steal additional funds.

The group behind the scheme bought fraudulent ads on major search engines, including Google and Bing, designed to closely mimic legitimate sponsored links from well-known banks. Users who clicked on the ads believed they were being directed to their bank’s website but were instead routed to counterfeit pages controlled by the criminals.

When victims entered their login information, malicious code embedded in the fake sites captured the credentials. The attackers then used that information to access real bank accounts and drain funds, the Justice Department said Monday.

Investigators said the seized domain hosted login credentials for thousands of victims and continued to support the fraud operation as recently as November 2025.

The seizure is part of a broader U.S. government crackdown on bank account takeover fraud, which has surged nationwide. Since January 2025, the FBI’s Internet Crime Complaint Center has received more than 5,100 complaints tied to such schemes, with reported losses exceeding $262 million.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Next Post

SEC sues crypto firms for defrauding investors out of $14 million

Related Posts

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper "redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure
Read More

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a business network, extracting sensitive data, and selling it on the dark web has become a reliable payday.  But in 2025, the data breaches that affected small and medium-sized businesses (SMBs) challenged our perceived wisdom about exactly which types of businesses cybercriminals are targeting.&nbsp
Read More

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution or program crashes. "Type
Read More