FBI and Indonesian Authorities Dismantle $20 Million W3LL Phishing Operation
The FBI and Indonesian law enforcement have taken down the W3LL phishing network, a sophisticated operation that caused over $20 million in fraud by selling a custom phishing kit and compromised accounts through a members-only marketplace.

The FBI, in coordination with Indonesian authorities, has dismantled the W3LL phishing operation, a sophisticated cybercrime network responsible for over $20 million in fraud. The operation, led by the FBI Atlanta field office, targeted the W3LL phishing kit—a tool that enabled cybercriminals to impersonate legitimate login pages and steal credentials. The kit was sold for $500 on the W3LL Store, a members-only marketplace active between 2019 and 2023, which facilitated the sale of more than 25,000 compromised accounts.
According to Fox 5 Atlanta, the phishing operation continued even after the marketplace shut down, shifting to encrypted messaging apps. Between 2023 and 2025, the W3LL kit was used to target over 17,000 victims worldwide. The FBI has seized the w3ll.store domain and identified the alleged developer, publicly referred to as 'G.L.' The takedown marks a significant blow to a network that had been operating for years.
W3LL was first discovered in 2023 by cybersecurity firm Group-IB, which detailed the operation in a September 2023 report. The threat actor behind W3LL had been active since at least 2017, initially selling the W3LL SMTP Sender—a custom tool for sending email spam. The actor later developed a phishing kit targeting Microsoft 365 accounts and eventually opened the W3LL Store. At the time of Group-IB's report, the marketplace had over 500 active users and more than 12,000 items listed for sale, generating an estimated $500,000 for the actor over a 10-month period.
What made the W3LL Store stand out from other underground markets was its comprehensive ecosystem. Group-IB noted that the threat actor created not just a marketplace but a fully compatible custom toolset covering almost the entire kill chain of business email compromise (BEC) attacks. This allowed cybercriminals of all technical skill levels to execute sophisticated phishing campaigns, from sending spam emails to harvesting credentials and bypassing multi-factor authentication.
The takedown of W3LL is a major victory for law enforcement, but it also highlights the persistent threat of phishing-as-a-service operations. The W3LL kit's ability to target Microsoft 365 accounts made it particularly dangerous for businesses and organizations that rely on the platform. The FBI's seizure of the domain and identification of the developer sends a strong message to other cybercriminals, though the shift to encrypted messaging apps suggests that such operations will continue to evolve.
This operation underscores the importance of international cooperation in combating cybercrime. The collaboration between the FBI and Indonesian authorities demonstrates that law enforcement agencies are increasingly capable of dismantling complex phishing networks. However, the scale of the W3LL operation—with over 17,000 victims and $20 million in fraud—serves as a reminder of the ongoing threat posed by phishing kits and the need for robust cybersecurity measures.
As the investigation continues, organizations are urged to implement multi-factor authentication, employee training, and advanced email filtering to defend against similar attacks. The takedown of W3LL may disrupt one network, but the underlying business model of phishing-as-a-service remains a lucrative and persistent threat in the cybersecurity landscape.