RaccoonO365 Phishing Network Disrupted by Microsoft and Cloudflare
Summary
Hide ▲
Show ▼
The RaccoonO365 phishing network, a financially motivated threat group, was disrupted by Microsoft's Digital Crimes Unit (DCU) and Cloudflare. The operation, executed through a court order in the Southern District of New York, seized 338 domains used by the group since July 2024. The network targeted over 2,300 organizations in 94 countries, including at least 20 U.S. healthcare entities, and stole over 5,000 Microsoft 365 credentials. The RaccoonO365 network operated as a phishing-as-a-service (PhaaS) toolkit, marketed to cybercriminals via a subscription model on a private Telegram channel. The group used legitimate tools like Cloudflare Turnstile and Workers scripts to protect their phishing pages, making detection more challenging. The mastermind behind RaccoonO365 is believed to be Joshua Ogundipe, who received over $100,000 in cryptocurrency payments. The group is also suspected to collaborate with Russian-speaking cybercriminals. Cloudflare executed a three-day 'rugpull' against RaccoonO365, banning all identified domains, placing interstitial 'phish warning' pages, terminating associated Workers scripts, and suspending user accounts to prevent re-registration.
Timeline
-
17.09.2025 07:31 3 articles · 12d ago
RaccoonO365 Phishing Network Disrupted by Microsoft and Cloudflare
RaccoonO365 phishing kits were advertised with an annual subscription fee of $600, as well as discounted options for 30- and 60-day licenses. RaccoonO365 advertised a new AI-powered service titled 'RaccoonO365 AI-MailCheck'. RaccoonO365 phishing emails impersonated trusted brands or organizations within the targeted company, using familiar workplace themes to exploit trust and create urgency. RaccoonO365 phishing emails incorporated the recipient's name into links or attachments to enhance credibility. RaccoonO365 used file names designed to mimic routine communications, such as finance or HR documents, policy agreements, contracts, and invoices. Cloudflare executed a three-day 'rugpull' against RaccoonO365, banning all identified domains, placing interstitial 'phish warning' pages, terminating associated Workers scripts, and suspending user accounts to prevent re-registration.
Show sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
Information Snippets
-
RaccoonO365 is a phishing-as-a-service (PhaaS) toolkit used to steal Microsoft 365 credentials.
First reported: 17.09.2025 07:313 sources, 3 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The operation seized 338 domains associated with RaccoonO365, disrupting its technical infrastructure.
First reported: 17.09.2025 07:313 sources, 3 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 was active since September 2024, targeting organizations in 94 countries.
First reported: 17.09.2025 07:313 sources, 3 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The group used legitimate tools like Cloudflare Turnstile and Workers scripts to protect phishing pages.
First reported: 17.09.2025 07:313 sources, 3 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 targeted over 2,300 organizations, including 20 U.S. healthcare entities.
First reported: 17.09.2025 07:313 sources, 3 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The mastermind behind RaccoonO365 is believed to be Joshua Ogundipe, who received over $100,000 in cryptocurrency payments.
First reported: 17.09.2025 07:313 sources, 3 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The disruption was executed through a court order in the Southern District of New York.
First reported: 17.09.2025 07:312 sources, 2 articlesShow sources
- RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains — thehackernews.com — 17.09.2025 07:31
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 has been renting subscription-based phishing kits through a private Telegram channel.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The prices for RaccoonO365 phishing kits ranged from $355 for a 30-day plan to $999 for a 90-day subscription, paid in USDT, BEP20, Polygon, or Bitcoin.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The RaccoonO365 Telegram channel had over 840 members as of August 25, 2025.
First reported: 17.09.2025 16:201 source, 1 articleShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
-
The group is believed to have sold approximately 100 to 200 subscriptions, with the actual number likely higher.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 is suspected to collaborate with Russian-speaking cybercriminals, as indicated by the use of Russian in its Telegram bot's name.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The RaccoonO365 phishing kits bundled CAPTCHA pages and anti-bot techniques to evade detection.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The stolen credentials, cookies, and other data were used in financial fraud, extortion attacks, or as initial access to other victims' systems.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 phishing emails often precede malware and ransomware attacks, posing significant risks to public safety, especially in healthcare settings.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 targeted over 2,300 organizations in the United States in April 2025, including more than 20 U.S. healthcare organizations.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The disruption was coordinated with Cloudflare's Cloudforce One and Trust and Safety teams.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
The group is tracked by Microsoft as Storm-2246.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
Microsoft's Digital Crimes Unit identified an operational security lapse that revealed a secret cryptocurrency wallet, aiding in the attribution and understanding of RaccoonO365's operations.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
A criminal referral for Joshua Ogundipe has been sent to international law enforcement.
First reported: 17.09.2025 16:202 sources, 2 articlesShow sources
- Microsoft and Cloudflare disrupt massive RaccoonO365 phishing service — www.bleepingcomputer.com — 17.09.2025 16:20
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 phishing kits were advertised with an annual subscription fee of $600, as well as discounted options for 30- and 60-day licenses.
First reported: 17.09.2025 22:441 source, 1 articleShow sources
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 advertised a new AI-powered service titled 'RaccoonO365 AI-MailCheck'.
First reported: 17.09.2025 22:441 source, 1 articleShow sources
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 phishing emails impersonated trusted brands or organizations within the targeted company, using familiar workplace themes to exploit trust and create urgency.
First reported: 17.09.2025 22:441 source, 1 articleShow sources
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 phishing emails incorporated the recipient's name into links or attachments to enhance credibility.
First reported: 17.09.2025 22:441 source, 1 articleShow sources
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
RaccoonO365 used file names designed to mimic routine communications, such as finance or HR documents, policy agreements, contracts, and invoices.
First reported: 17.09.2025 22:441 source, 1 articleShow sources
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
-
Cloudflare executed a three-day 'rugpull' against RaccoonO365, banning all identified domains, placing interstitial 'phish warning' pages, terminating associated Workers scripts, and suspending user accounts to prevent re-registration.
First reported: 17.09.2025 22:441 source, 1 articleShow sources
- Microsoft Disrupts 'RaccoonO365' Phishing Service — www.darkreading.com — 17.09.2025 22:44
Similar Happenings
TA558 Uses AI-Generated Scripts to Deliver Venom RAT in Brazil Hotel Attacks
TA558, tracked as RevengeHotels, has launched new attacks targeting hotels in Brazil and Spanish-speaking markets. The group uses AI-generated scripts to deploy Venom RAT via phishing emails. The campaign aims to capture credit card data from guests and travelers. The threat actor has been active since 2015, focusing on hospitality and travel sectors. They have historically used various RATs and custom malware to achieve their goals. The latest campaign involves phishing emails with Portuguese and Spanish lures, leading to the download of malicious scripts and payloads. Venom RAT, based on Quasar RAT, includes features like data exfiltration, reverse proxy, and anti-kill mechanisms. It spreads via USB drives and disables Microsoft Defender Antivirus.
Insight Partners Ransomware Breach Affects 12,657 Individuals
Insight Partners, a New York-based venture capital and private equity firm, has notified 12,657 individuals that their personal information was compromised in a ransomware attack. The breach, which occurred in October 2024, involved a sophisticated social engineering attack that allowed threat actors to access and encrypt servers. The stolen data includes banking and tax information, personal details of current and former employees, and information related to limited partners, funds, and portfolio companies. The company has offered complimentary credit or identity monitoring services to those affected and has filed breach notifications with state attorneys general. The incident highlights the ongoing risk of social engineering attacks and the potential for significant data exfiltration in ransomware breaches.
SlopAds Fraud Ring Exploits 224 Android Apps for Ad Fraud
A sophisticated ad fraud operation, SlopAds, exploited 224 Android apps to generate 2.3 billion daily ad bids. The apps, downloaded 38 million times across 228 countries, used steganography and hidden WebViews to create fraudulent ad impressions and clicks. The fraud was conditional, activating only if the app was installed via an ad click. Google removed the offending apps from the Play Store and updated Google Play Protect to warn users. The operation leveraged AI-themed services and a complex command-and-control infrastructure. The fraudulent behavior was designed to evade detection by blending malicious traffic into legitimate campaign data. The SlopAds campaign was discovered by HUMAN's Satori Threat Intelligence team, which identified the apps as 'AI slop' due to their mass-produced appearance and AI-themed services. The apps used Firebase Remote Config to download an encrypted configuration file containing URLs for the ad fraud malware module, cashout servers, and a JavaScript payload. The campaign included numerous command-and-control servers and more than 300 related promotional domains, suggesting the threat actors planned further expansion.
FinWise insider breach exposes 689K American First Finance customers' data
A former employee of FinWise Bank accessed sensitive customer files after the end of their employment, impacting 689,000 American First Finance (AFF) customers. The breach involved personal data, including full names. FinWise has strengthened internal controls and is offering credit monitoring services to affected individuals. The breach occurred on May 31, 2024, and was disclosed in September 2025. The incident has led to multiple class-action lawsuits. FinWise Bank partners with AFF to originate and fund loans. The breach was discovered and investigated with the help of external cybersecurity professionals. The exact methods of unauthorized access and the full extent of the exposed data remain undisclosed.
Increased Browser-Based Attacks Targeting Business Applications
Browser-based attacks targeting business applications have surged, exploiting modern work practices and decentralized internet apps. These attacks, including phishing, malicious OAuth integrations, and browser extensions, compromise business apps and data by targeting users. The attacks leverage various delivery channels and evasion techniques, making them difficult to detect and block. Phishing attacks have evolved to use non-email channels such as social media, instant messaging apps, and malicious search engine ads. These attacks often bypass traditional email security controls and are harder to detect. Attackers exploit the decentralized nature of modern work environments, targeting users across multiple apps and communication channels. Non-email phishing attacks can result in significant breaches, as seen in the 2023 Okta breach. The rise in these attacks highlights the need for enhanced browser security measures and better visibility into user activities within the browser.