Operation Phantom Phish: Tracking the XFarisX Cybercrime Syndicate
The XFarisX phishing case is a simulation based on real cybercrime tactics seen in Malaysia. This fictionalized scenario is designed to raise awareness by mimicking a large-scale credential theft attack. The group behind it impersonates legitimate bodies like LHDN and local banks, sending out fraudulent messages via SMS and email.
Through cloned websites and stolen branding, they trick victims into entering sensitive data such as banking details, IC numbers, and OTP codes. Our investigation reveals coordinated efforts involving spoofed SMS gateways, fake domains, and hidden Telegram marketplaces used to sell the stolen data.
PRIMARY SUSPECT
Skilled in web cloning, domain spoofing, and bulk SMS phishing. Believed to be the main perpetrator behind this campaign. Uses VPNs and foreign hosting to conceal identity. Also suspected of selling stolen data on Telegram.
PERSON OF INTEREST
Launders stolen funds through crypto exchanges and mixing services. Acts as middleman for converting stolen credentials into crypto. Connected to multiple wallet addresses flagged in this investigation.
PERSON OF INTEREST
Technical specialist in bulletproof hosting services. Helped register phishing domains and maintain infrastructure, including fast-flux DNS to hide real locations.
CLEARED
Initially suspected but had verified alibis. His digital footprint and timeline didn’t match the phishing operation.
CLEARED
Although initially flagged due to similar attack traces, forensic analysis confirmed no connection to phishing domains or financial trails.
CLEARED
No phishing software or traceable digital trails linked to her devices. All access logs showed mismatches with the timeline of the attacks.
First victim reports unauthorized deduction after SMS claiming tax refund.
8 fake LHDN domains discovered, linked by WHOIS data to alias XFarisX.
Hosting found using fast-flux DNS from Eastern Europe.
Blockchain trail identifies crypto laundering by alias "DarkWei".
Spring Security officially launched to analyze phishing behavior.
Hosting provider confirms alias "PhantomPhisher" managed phishing domains.
Status: Still under active investigation in simulation environment.