{"id":2643,"date":"2026-01-20T11:00:00","date_gmt":"2026-01-20T19:00:00","guid":{"rendered":"https:\/\/celacampaig.wpenginepowered.com\/?p=2643"},"modified":"2026-01-28T14:48:13","modified_gmt":"2026-01-28T22:48:13","slug":"raccoono365","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/raccoono365\/","title":{"rendered":"Inside the takedown of RaccoonO365: How Phishing-as-a-Service fuels ransomware\u2019s engine"},"content":{"rendered":"
Picture this: It’s Monday morning. You log on to a full email inbox. One message is from Microsoft, with information about a software update. The logo and layout are professional; the grammar is perfect. But you’ve done your organization’s cybersecurity training, so you check the domain it was sent from: You click the link, land on a CAPTCHA page, and select all the squares containing motorcycles to prove you’re human—only to land on yet another CAPTCHA. Certainly a scam wouldn’t have this much security, right? After the second test, you get to a Microsoft login page and type in your username and password.<\/p> You’ve just become one of more than 5,000 Microsoft customers across 94 countries whose login credentials were stolen by cybercriminals using the phishing tool RaccoonO365.<\/p> That domain? Look closer: it wasn’t RaccoonO365 is an underground “phishing-as-a-service” business, part of the burgeoning cybercrime-as-a-service (CaaS) economy<\/a> in which cybercriminals sell or rent tools and services that enable people to launch sophisticated cyberattacks like ransomware without technical skills or expertise. Thanks to prepackaged services like RaccoonO365, the CaaS ecosystem makes cybercrime cheaper and easier for malicious actors of all kinds, from opportunists looking for quick cash to nation-state actors seeking political influence.<\/p> “It’s the fast-food franchise version of cybercrime,” says Sean Farrell, assistant general counsel for the Digital Crimes Unit (DCU), Microsoft’s team dedicated to fighting cybercrime. RaccoonO365 was the fastest-growing tool used by cybercriminals to steal Microsoft 365 usernames and passwords—until the DCU disrupted their operations<\/a> in September 2025.<\/p> RaccoonO365 sold subscription-based phishing kits that included fraudulent email copy, Microsoft-branded web templates to trick users into providing their credentials, and a tool that enabled subscribers to input up to 9,000 email addresses per day, far more than a legitimate email server would allow. RaccoonO365 was sold on the chat platform Telegram, where its group had over 850 members. The service racked up at least $100,000 in cryptocurrency payments, which reflects an estimated 100–200 subscriptions. Over the course of a year, hundreds of millions of phishing emails went out through RaccoonO365’s service.<\/p> In a world of deepfakes and disinformation campaigns, email phishing might seem old-school, even benign. But in the CaaS ecosystem, stolen user credentials are the foundation for every type of cybercrime imaginable.<\/p> “The general public may not fully appreciate how operators like RaccoonO365 enable the scaling of other actors who want to deploy ransomware and a slew of follow-on criminal activities,” Farrell says. “Initial access enables you to do the worst things you can do on a victim network.”<\/p> Ransomware is one of the most common and detrimental uses of stolen credentials. Phish kits like RaccoonO365 enable ransomware actors to bypass multifactor authentication (MFA) and launch devastating attacks with little or no technological acumen, just a fee paid in cryptocurrency to vendors known in the CaaS world as “access brokers.”<\/p> According to the 2025 Microsoft Digital Defense Report<\/a> (MDDR), cybercriminals deployed 120 ransomware variants against 71 industries in 2025. While ransomware can be used by nation-state actors for espionage purposes, most ransomware actors are after the money—encrypting victims’ data and demanding a fee to decrypt it.<\/p> For that reason, ransomware operators often target organizations that have sensitive data and tight cybersecurity budgets, with limited abilities to respond to cyberattacks. One of the most common targets is healthcare: The MDDR notes that there were 376 ransomware attacks on healthcare organizations in 2025. The consequences can be catastrophic, delaying critical care and services for patients, compromising lab results, leaking sensitive data, and costing organizations millions of dollars.<\/p> Many of these attacks can be traced back to simple phishing, often relying on social engineering to take advantage of human error. “Phishing is the initial entry vector for a lot of harm that’s done in the healthcare industry,” Farrell says. In the case of RaccoonO365, threat actors used the service to target more than 20 US-based healthcare companies.<\/p> In July 2024, Raccoon O365 hit the radar of Microsoft’s Threat Intelligence. The team saw an alarming rise in Microsoft customers being tricked into giving away their access information, and they were shocked to discover that one group of malicious actors was responsible for thousands of stolen credentials.<\/p> That’s when they turned to their partners at DCU. “They came to us and said, ‘Hey, this is a huge problem. Is there anything you can do to help?’” says Jason Lyons, DCU’s senior investigations manager.<\/p>microsoft.com<\/strong><\/code>. So far, so good.<\/p>microsoft.com<\/code> <\/strong>but rnicrosoft.com<\/strong><\/code>, with the lowercase M replaced by RN—a “homoglyph” that’s tough to detect at a glance. And the CAPTCHAs? They were not only designed to trick you into trusting the sender, but they were also screening out automated phishing detection software.<\/p>Why it matters: Phishing and ransomware<\/h2>
Microsoft’s Digital Crimes Unit takes the case<\/h2>