VerifTools Fake-ID Marketplace Seized and Relaunched
Summary
Hide â˛
Show âŧ
The VerifTools marketplace, which sold fraudulent identity documents, was seized by authorities in the Netherlands and the United States. The operators have since relaunched the service on a new domain. The VerifTools marketplace was used to generate counterfeit identification documents for all 50 U.S. states and various foreign countries. The FBI linked approximately $6.4 million in illicit proceeds to the platform. The seizure involved taking down two domains and a blog, redirecting visitors to a notice from the FBI. Despite the takedown, the operators relaunched the service on a new domain, veriftools[.]com, on August 28, 2025. VerifTools was used to bypass identity verification systems, facilitating unauthorized access to online accounts and cryptocurrency theft.
Timeline
-
29.08.2025 12:05 đ° 1 articles
VerifTools Fake-ID Marketplace Seized and Relaunched
On August 28, 2025, authorities in the Netherlands and the United States seized the VerifTools marketplace, which sold fraudulent identity documents. The seizure involved taking down two domains and a blog, redirecting visitors to an FBI notice. The operators relaunched the service on the domain veriftools[.]com. The FBI linked approximately $6.4 million in illicit proceeds to the platform. The Dutch National Police confiscated multiple servers and secured the website's infrastructure for analysis.
Show sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
Information Snippets
-
VerifTools sold counterfeit driver's licenses, passports, and other identification documents.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
The FBI began investigating VerifTools in 2022 after discovering a criminal operation using stolen identities to access cryptocurrency accounts.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
The marketplace offered counterfeit IDs for as little as $9.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
Approximately $6.4 million in illicit proceeds were linked to VerifTools.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
The seizure involved taking down two domains (verif[.]tools and veriftools[.]net) and one blog, redirecting visitors to an FBI notice.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
The operators relaunched VerifTools on the domain veriftools[.]com.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
The Dutch National Police confiscated two physical servers and more than 21 virtual servers.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
-
The website's infrastructure was secured and copied for analysis.
First reported: 29.08.2025 12:05đ° 1 source, 1 articleShow sources
- Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain â thehackernews.com â 29.08.2025 12:05
Similar Happenings
Salesloft OAuth breach exposes Salesforce customer data via Drift AI chat agent
A threat actor, UNC6395, exploited OAuth tokens associated with the Drift AI chat agent to breach Salesloft and access customer data across multiple integrations, including Salesforce, Google Workspace, and others. The breach occurred between August 8 and 18, 2025, affecting over 700 organizations, including Zscaler, Palo Alto Networks, Cloudflare, Google Workspace, PagerDuty, Proofpoint, SpyCloud, and Tanium. The attackers targeted Salesforce instances and accessed email from a small number of Google Workspace accounts, exporting large volumes of data, including credentials and access tokens. Salesloft and Salesforce have taken steps to mitigate the breach and are advising affected customers to revoke API keys and rotate credentials. Salesloft will temporarily take Drift offline to enhance security. UNC6395 demonstrated operational security awareness by deleting query jobs, indicating a sophisticated approach. The breach highlights the risks of third-party integrations and the potential for supply chain attacks. The breach is unrelated to previous vishing attacks attributed to ShinyHunters. UNC6395 systematically exported large volumes of data from numerous corporate Salesforce instances, searching for secrets that could be used to compromise victim environments. The campaign is not limited to Salesforce customers who integrate their own solutions with the Salesforce service; it impacts all integrations using Salesloft Drift. There is no evidence that the breaches directly impacted Google Cloud customers. Organizations are urged to review all third-party integrations connected to their Drift instance, revoke and rotate credentials for those applications, and investigate all connected systems for signs of unauthorized access. The blast radius of the Salesloft Drift attacks remains uncertain, with the ultimate scope and severity still unclear. Numerous companies have disclosed downstream breaches resulting from this campaign, including Zscaler, Palo Alto Networks, Proofpoint, Cloudflare, and Tenable. Zscaler and Palo Alto Networks warned of potential social engineering attacks resulting from the campaign. Cloudflare confirmed that some customer support interactions may reveal information about a customer's configuration and could contain sensitive information like access tokens. Okta successfully prevented a breach of its Salesforce instance by enforcing inbound IP restrictions, securing tokens with DPoP, and using the IPSIE framework. Okta recommends that organizations demand IPSIE integration from application vendors and implement an identity security fabric unified across applications. Palo Alto Networks' Unit 42 recommends conducting an immediate log review for signs of compromise and rotating exposed credentials. The breach started with the compromise of Salesloft's GitHub account between March and June 2025. UNC6395 accessed the Salesloft GitHub account and downloaded content from multiple repositories, added a guest user, and established workflows. Reconnaissance activities occurred between March 2025 and June 2025 in the Salesloft and Drift application environments. Salesloft isolated the Drift infrastructure, application, and code, and took the application offline on September 5, 2025. Salesloft rotated credentials in the Salesloft environment and hardened the environment with improved segmentation controls between Salesloft and Drift applications. Salesforce restored the integration with the Salesloft platform on September 7, 2025, but Drift remains disabled. 22 companies have confirmed they were impacted by the supply chain breach. ShinyHunters and Scattered Spider were also involved in the Salesloft Drift attacks.