Justice Department Seizes Database of Stolen Passwords in Bank Fraud Case

ago 2 hours
Justice Department Seizes Database of Stolen Passwords in Bank Fraud Case

The Justice Department has successfully seized a domain and database linked to a scheme targeting American bank account holders. The domain, web3adspanels.org, was involved in facilitating fraudulent activities aimed at stealing login credentials for bank accounts.

Details of the Seizure

This operation comes in response to a rise in bank account takeover fraud, which the FBI highlighted in a recent public service announcement. The investigation reveals that the criminal group behind this scheme utilized search engines like Google and Bing to deliver deceptive advertisements mirroring those used by legitimate financial institutions.

How the Fraud Worked

  • Fraudulent ads mimicked bank-sponsored search results.
  • Victims were misled into visiting fake bank websites.
  • Inputted login credentials were captured by malicious software.

Once the criminals obtained the login details, they accessed real bank accounts to withdraw funds illegally. So far, the FBI has identified 19 victims nationwide, including two businesses in Georgia. This scheme resulted in attempted losses of about $28 million, with actual losses totaling approximately $14.6 million.

Scope of the Operation

The seized domain was home to a server that stored stolen credentials from thousands of victims. According to FBI sources, this domain was operational as recently as November 2025. Since the beginning of 2025, the FBI’s Internet Crime Complaint Center (IC3) has received over 5,100 complaints of bank account takeover fraud, indicating losses that surpass $262 million.

Public Advisory

The public is urged to stay vigilant against potential fraud. Recommendations include:

  • Regularly monitoring financial accounts.
  • Using bookmarks or favorites for secure navigation to banking websites.
  • Being cautious of phishing attempts.

A notification on the seized domain informs visitors of its law enforcement seizure, disrupting the criminals’ access to stolen credentials. Additionally, officials in Estonia have preserved data from servers used for phishing, aiding the investigation.

Law Enforcement Collaboration

This operation has been coordinated by several key figures, including Acting Assistant Attorney General Matthew R. Galeotti and U.S. Attorney Theodore S. Hertzberg. The FBI Atlanta Field Office, led by Special Agent in Charge Paul Brown, is actively investigating the case, with prosecution efforts by Trial Attorney Brian Mund and Assistant U.S. Attorney Jessica C. Morris.

Support came from the Justice Department’s Office of International Affairs and various Estonian law enforcement agencies. This collaboration is part of ongoing efforts to combat cybercrime, with the Computer Crime and Intellectual Property Section securing over 180 convictions since 2020 and recovering more than $350 million for victims.