Case #XF-2025-0420

Operation Phantom Phish: Tracking the XFarisX Cybercrime Syndicate

Scroll to Explore

Incident Summary

The XFarisX phishing case is a simulation based on real cybercrime tactics seen in Malaysia. This fictionalized scenario is designed to raise awareness by mimicking a large-scale credential theft attack. The group behind it impersonates legitimate bodies like LHDN and local banks, sending out fraudulent messages via SMS and email.

Through cloned websites and stolen branding, they trick victims into entering sensitive data such as banking details, IC numbers, and OTP codes. Our investigation reveals coordinated efforts involving spoofed SMS gateways, fake domains, and hidden Telegram marketplaces used to sell the stolen data.

Case Details

Case Number: XF-2025-0420
Date Reported: April 20, 2025
Estimated Losses: RM 13.2 million
Victims: 1,243 confirmed
Attack Vector: SMS Phishing (Smishing)
Geographic Scope: Malaysia, Singapore, Indonesia, Brunei
Status: Active Investigation

Key Suspects

XFarisX PRIMARY SUSPECT

Wan Ahmad Faris

Alias: XFarisX

Skilled in web cloning, domain spoofing, and bulk SMS phishing. Believed to be the main perpetrator behind this campaign. Uses VPNs and foreign hosting to conceal identity. Also suspected of selling stolen data on Telegram.

Digital Evidence:
  • Connected to 8 cloned domains mimicking LHDN and local banks
  • Phone number traced from phishing OTP scam matches VPS registration
  • Operated multiple Telegram groups selling stolen bank logins
Suspect 2 PERSON OF INTEREST

Zhang Wei

Alias: DarkWei

Launders stolen funds through crypto exchanges and mixing services. Acts as middleman for converting stolen credentials into crypto. Connected to multiple wallet addresses flagged in this investigation.

Digital Evidence:
  • Blockchain tracing shows stolen funds sent to wallet under alias
  • Wallet used crypto mixers and foreign exchanges (non-KYC)
  • Found in transaction chain related to OTP theft proceeds
Suspect 3 PERSON OF INTEREST

Aisha Binti Abdullah

Alias: PhantomPhisher

Technical specialist in bulletproof hosting services. Helped register phishing domains and maintain infrastructure, including fast-flux DNS to hide real locations.

Digital Evidence:
  • Registered phishing domains using bulletproof hosting services
  • Hosted fast-flux DNS servers for scam website evasions
  • Logs shared by hosting provider confirm activity under alias
Suspect 4 CLEARED

Nigel Kumar

Alias: (Unknown)

Initially suspected but had verified alibis. His digital footprint and timeline didn’t match the phishing operation.

Clearing Evidence:
  • Verified alibi during major SMS phishing periods
  • No digital trail linking to XFarisX or domains
  • Device forensics showed no malware or phishing kits
Suspect 4 CLEARED

John Pork

Alias: JohnPig69

Although initially flagged due to similar attack traces, forensic analysis confirmed no connection to phishing domains or financial trails.

Clearing Evidence:
  • Hosting overlap was coincidental; different customer account
  • No transactions linked to any stolen funds or BTC trails
  • Fingerprint analysis shows mismatched attack patterns
Suspect 4 CLEARED

Sum Ting Wong

Alias: (Unknown)

No phishing software or traceable digital trails linked to her devices. All access logs showed mismatches with the timeline of the attacks.

Clearing Evidence:
  • No phishing tools or links found on devices
  • IPs didn’t match attack servers
  • Alibis verified, no financial ties

Case Timeline

March 15, 2025

First Victim Report

First victim reports unauthorized deduction after SMS claiming tax refund.

March 22, 2025

Domain Cluster Identified

8 fake LHDN domains discovered, linked by WHOIS data to alias XFarisX.

April 5, 2025

Infrastructure Analysis

Hosting found using fast-flux DNS from Eastern Europe.

April 12, 2025

Money Trail Found

Blockchain trail identifies crypto laundering by alias "DarkWei".

April 20, 2025

Case Officially Opened

Spring Security officially launched to analyze phishing behavior.

May 1, 2025

Hosting Provider Cooperation

Hosting provider confirms alias "PhantomPhisher" managed phishing domains.

May 10, 2025

Current Status

Status: Still under active investigation in simulation environment.

Digital Evidence