Microsoft's Takedown of ONXX Phishing Websites: A Blow to Cybercrime

Microsoft's Takedown of ONXX Phishing Websites: A Blow to Cybercrime

Martin Kouyoumdjian |

Microsoft's Strategic Seizure of Malicious Websites

In a decisive move to combat cybercrime, Microsoft recently orchestrated the seizure of 240 websites linked to the ONXX phishing-as-a-service operation. This action represents a significant disruption to a pervasive cybercrime infrastructure aimed particularly at critical industries such as financial services. The move highlights Microsoft’s commitment to cyber security and its proactive stance in safeguarding digital spaces.

Court-Ordered Disruption

The seizure was facilitated by a civil court order in the Eastern District of Virginia, granting permission to redirect the malicious infrastructure to Microsoft's custody. This legal maneuver underscores the cooperation between legal entities and technology companies in tackling cyber threats and demonstrates how judicial tools can be leveraged to suppress criminal activities on the internet.

Abanoub Nady, also known online as “MRxC0DER,” was identified as the architect behind these phishing kits. Operating out of Egypt, Nady developed and sold these malicious tools under a fraudulent brand narrative, using the name “ONNX.” This was a deliberate misuse of the legitimate branding associated with an open standard format for machine learning models.

Mechanisms and Marketing of the Scam

The ONXX operation targeted the financial services sector heavily due to its handling of sensitive data and significant transactions. Utilizing adversary-in-the-middle (AiTM) phishing techniques, the kits enabled attackers to bypass even multi-factor authentication (MFA) defenses by stealing critical credentials and session cookies.

Subscription-Based Cybercrime

Remarkably, the ONXX phishing service emulated legitimate business models through a subscription service. Offering tiers from Basic to Enterprise versions, the operation included an “Unlimited VIP Support” feature for enterprise users, indicating a level of organization and customer orientation more commonly associated with legal enterprises. This subscription model added a veneer of legitimacy and appealed to aspiring cybercriminals seeking to maximize their nefarious capabilities.

Promotion and sales of the ONXX phishing kits were carried out through branded storefronts, further exploiting the ONNX name. The sales channels predominantly involved Telegram, illustrating how encrypted communication platforms can be misused to facilitate and obscure illegal activities. The deployment of these marketing strategies had been tracked by Microsoft as far back as 2017, revealing a long-term engagement in phishing scams despite previous identifications under monikers like “Caffeine” and “FUHRER.”

The Broader Impact and Ongoing Challenges

While Microsoft’s action undoubtedly deals a significant blow to the operations of MRxC0DER, it also highlights a persistent challenge in cybersecurity. The digital void left by ONXX's disruption may soon be filled by other malicious providers, as threat actors are notoriously adaptive. This scenario indicates the need for continuous vigilance, collaboration across sectors, and innovation in combating cybercrime.

Microsoft's efforts, by effectively dismantling this operation, provide valuable lessons and strategies for other entities aiming to protect their digital environments. As cyber threats evolve, so too must the approaches of those tasked with defense, ensuring that no malicious activity goes unchecked or unchallenged in the ongoing battle for cybersecurity.