
Federal authorities have successfully dismantled BidenCash, one of the largest criminal marketplaces operating on both the dark web and the traditional internet.
In a coordinated law enforcement operation, approximately 145 domains associated with the platform were seized.
The BidenCash marketplace began operations in March 2022, operating as a sophisticated criminal enterprise designed to streamline the illegal trafficking of stolen financial data and personally identifiable information (PII).
BidenCash Cybercrime Operations
Federal investigators revealed that the platform had amassed over 117,000 registered customers during its operational period, demonstrating the extensive reach of this cybercriminal network.
The marketplace’s infrastructure utilized both darknet domains, accessible through specialized browsers like Tor, and traditional internet domains to maximize accessibility for potential buyers of stolen data.
Law enforcement officials indicated that all seized domains will now be redirected to a U.S. law enforcement-controlled server, effectively neutralizing the platform’s ability to facilitate future criminal transactions.
The scope of the criminal operation was staggering, with court records revealing that BidenCash facilitated the trafficking of over 15 million payment card numbers and associated personal data.
The marketplace generated more than $17 million in illicit revenue through transaction fees charged to users conducting illegal purchases on the platform.
BidenCash operators employed sophisticated technical methods to distribute stolen financial information, including complete credit card datasets containing critical authentication elements.
The compromised data packages typically included primary account numbers (PANs), expiration dates, Card Verification Value (CVV) codes, cardholder names, billing addresses, email addresses, and phone numbers, providing criminals with comprehensive information necessary for fraudulent transactions.
Between October 2022 and February 2023, the marketplace administrators executed an unprecedented promotional campaign, publishing approximately 3.3 million individual stolen credit card records as free downloads to attract new users to their services.
This massive data dump represented one of the largest single releases of compromised payment card information in the recent history of cybercrime.
The platform also specialized in selling compromised computer credentials, enabling unauthorized access to various systems and networks.
These credentials could be used for account takeover attacks, identity theft, and further data exfiltration activities, expanding the potential impact beyond simple payment card fraud.
Authorities Dismantle Major Criminal Marketplace
The successful dismantling of BidenCash required extensive international collaboration, highlighting the global nature of modern cybercrime investigations.
The operation involved multiple federal agencies, including the U.S. Secret Service’s Frankfurt Resident Office, the Secret Service’s Cyber Investigative Section, and the FBI Albuquerque Field Office.
International partners played crucial roles in the investigation, with the Dutch National High Tech Crime Unit providing essential technical assistance.
Additionally, private sector cybersecurity organizations, including The Shadowserver Foundation and Searchlight Cyber, contributed valuable intelligence and technical expertise to support the enforcement action.
Federal authorities obtained court authorization to seize cryptocurrency funds that BidenCash used to receive illicit proceeds from its illegal operations.
This financial component of the seizure demonstrates law enforcement’s evolving capabilities to trace and recover digital assets used in cybercriminal enterprises.
The case is being prosecuted by Assistant U.S. Attorney Zoe Bedell, with the investigation representing a significant victory in ongoing efforts to disrupt large-scale cybercriminal marketplaces operating in the digital underground economy.
Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests
Click Here For The Original Source.