Dutch Police Arrest Third Suspect Behind JokerOTP Phishing Platform That Caused $10M in Losses

Dutch Police Arrest Third Suspect Behind JokerOTP Phishing Platform That Caused $10M in Losses

Netherlands police have arrested a 21-year-old man from Dordrecht suspected of selling access to the JokerOTP phishing automation platform — a tool designed to intercept one-time passwords through automated voice calls that tricked victims into handing over their MFA codes.

The arrest is the third in a three-year investigation that dismantled the JokerOTP phishing-as-a-service operation in April 2025. Authorities previously arrested the platform's developer and a co-developer who operated under the aliases "spit" and "defone123."

How JokerOTP Worked

The platform operated on a subscription model, with the arrested suspect selling license keys via Telegram. Subscribers could configure the tool to automate calls to victims and capture OTPs, PINs, card data, and social security numbers. Targets included users of PayPal, Venmo, Coinbase, Amazon, and Apple.

The attack chain exploited a critical timing window. Attackers would use stolen credentials — obtained from infostealer malware or purchased on dark web markets — to initiate a login on a target account. This triggered a legitimate OTP delivery to the victim. Simultaneously, JokerOTP placed an automated call to the victim impersonating the service's security team, requesting the code they had just received.

"Victims were automatically called by the bot and informed that criminals were attempting to gain access to their account," explained Anouk Bonekamp, team leader of Cybercrime Oost-Brabant. "The bot then asked them to enter the one-time password. Victims therefore believe they are protecting themselves by cooperating."

Because the calls coincided precisely with the real authentication prompt, many victims failed to recognize the scam and willingly provided their codes.

Scale and Impact

Over two years of operation, JokerOTP was used in more than 28,000 attacks targeting users across 13 countries, causing an estimated $10 million in financial losses. Compromised accounts were used for unauthorized purchases, fund transfers, and full account takeovers.

Investigation Ongoing

Dutch police confirmed the investigation continues, with dozens of JokerOTP subscribers in the Netherlands already identified and facing prosecution. The takedown underscores law enforcement's increasing focus on the PhaaS ecosystem that enables credential theft at scale.

Recommendation

Users who receive unsolicited calls requesting OTPs or PINs should hang up immediately — legitimate services never ask for authentication codes via phone. Check exposure on Have I Been Pwned, as leaked credentials are the prerequisite for these attacks. Organizations should consider transitioning from SMS and voice-based OTP to hardware security keys or app-based FIDO2 authentication, which are resistant to real-time phishing interception.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire