Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Justice Department Seizes Four Web Domains Used to Create Over 40,000 Spoofed Websites and Store the Personal Information of More Than a Million Victims

Published By
U.S. Attorney's Office
Published Date
Subtitle

Body

PITTSBURGH – United States Attorney Eric G. Olshan announced today the seizure of four domains used by the administrators and customers of a domain spoofing service. The domain seizures were authorized pursuant to seizure warrants issued in the Western District of Pennsylvania and were executed in coordination with the arrest of dozens of administrators and customers of the illicit service by foreign law enforcement agencies.

According to court records, the United States obtained authorization to seize the domains as part of an investigation of the spoofing service operated through the Lab-host.ru domain (LabHost), which resolves to a Russian internet infrastructure company. LabHost provided online infrastructure and interactive functionality for its subscription-based services. According to court records, customers of LabHost used its services to create and manage spoofed websites designed to look like the legitimate websites of businesses such as Amazon, Netflix, Wells Fargo, Bank of America, and Chase Bank. LabHost customers used the spoofed websites to lure unwitting victims into disclosing their personally identifiable information (PII)—e.g., date of birth, email address, password, address, and credit card information—on the websites the victims believed were legitimate. In turn, according to court documents, LabHost’s customers used the stolen PII to engage in unauthorized financial transactions at the expense of the victims. As outlined in court records, LabHost has been used to create over 40,000 spoofed websites, and its infrastructure has stored over one million user credentials and nearly 500,000 compromised credit cards.

The warrants authorized the seizure of the following four domains associated with application programming interface (API) services used to install spoofed websites and manage LabHost’s phishing and credential-theft operations: Instapi-1xoa93z90o348fz.co, Api2-4hdfix74ks.co, Api1-9kcpqcf7olw1w300w3m6.cc, and Api-d789342789342uy432hjf87df87dfk.cc. The four LabHost API domains were registered to NameSilo, LLC, a third-party webhosting service based in the United States. According to court records, the seized domains represented property used to commit violations of federal criminal law, including access device fraud, computer fraud, wire fraud, identity theft, and money laundering.

The effect of the domain seizures was to shut down the LabHost platform.

“Together with our international partners, the Justice Department has disrupted another cybercrime scheme originating from Russia that enabled criminals to steal from over a million victims in the United States and around the world,” said Attorney General Merrick B. Garland. “I am grateful to the U.S. Attorney’s Office for the Western District of Pennsylvania, the FBI, and our partners at the Secret Service for their work on this case, and to our foreign law enforcement partners whose efforts have led to the arrests of dozens of LabHost administrators and users.”

“The theft of personal information—and the financial ruin that often follows—should never be just another cost of using the internet for ordinary citizens,” U.S. Attorney Olshan said. “Today’s domain seizures show that cybercriminals’ greed will not go unchecked—no matter their sophistication and geographic reach. We will continue to work with our domestic and foreign law enforcement partners, using all available tools, to protect the global public.”

“Seizing LabHost and arresting those involved will have a systemic impact on transnational cybercrime,” said Special Agent in Charge Timothy P. Burke, U.S. Secret Service Pittsburgh Field Office. “We are proud to work with our foreign and domestic law enforcement partners as we continue to counter those engaged in cybercrime.”

“Behind every cybercrime-as-a-service operation lurks one thing: financial devastation,” said FBI Pittsburgh Special Agent in Charge Kevin Rojek. “The FBI and our global partners will continue to aggressively pursue anyone who thinks they can get rich by stealing from hard-working Americans. Selling cybercrime tools has ripple effects that go far beyond the businesses and borders of America. With every theft and intrusion, the public loses more and more trust in our critical digital infrastructure.”

The domain seizures in the United States occurred in conjunction with the international arrests of dozens of LabHost administrators and customers facing criminal charges in more than a dozen foreign countries. Law enforcement authorities from the following countries participated in the investigation: Australia, Austria, Belgium, Canada, Czechia, Estonia, Finland, Ireland, Malta, the Netherlands, New Zealand, Poland, Portugal, Romania, Spain, Sweden, and the United Kingdom.

Assistant United States Attorney Mark V. Gurzo is representing the government in this matter.

The Federal Bureau of Investigation and United States Secret Service conducted the investigation in the United States, and the international investigation was led by the United Kingdom’s London Metropolitan Police, with the support of Europol’s European Cybercrime Centre and Joint Cybercrime Action Taskforce.

###


Link to seizure warrant (unsealed by the Court on 4/18/2024)
Link to Europol press release on seizures