Phishing Kits & PhaaS

What Is 16Shop?

16Shop is a commercial phishing kit and Phishing-as-a-Service (PhaaS) platform that operated from at least November 2017 through August 2023, selling phishing kits priced at $60-$150 to attackers and facilitating the compromise of over 70,000 users across 43 countries before law enforcement disma...

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

16Shop is a commercial phishing kit and Phishing-as-a-Service (PhaaS) platform that operated from at least November 2017 through August 2023, selling phishing kits priced at $60-$150 to attackers and facilitating the compromise of over 70,000 users across 43 countries before law enforcement dismantlement through INTERPOL-coordinated investigation resulting in operator arrest in Indonesia. The platform provided modular multi-target phishing capabilities including 117 bank-specific phishing pages with authentic logos, email provider templates for Yahoo, Yahoo Japan, AOL, Gmail, and Hotmail, and generic login forms for unfamiliar domains, creating over 150,000 phishing domains during nearly six years of operation. According to INTERPOL investigation reporting from August 2023, Trend Micro threat research, and Krebs on Security analysis, 16Shop represented one of the most prolific credential harvesting tools in the cybercriminal ecosystem before its disruption.

The platform operated as a kit-sale model where customers purchased phishing templates for fixed prices rather than subscribing to ongoing services, differentiating it from contemporary subscription-based PhaaS offerings. According to Akamai and Trend Micro analysis, 16Shop implemented sophisticated anti-piracy measures including API-driven license validation, blacklists blocking security researchers and company employees, and unauthorized use detection through centralized license verification. The August 2023 arrests of the 21-year-old Indonesian administrator and two associates (one in Indonesia, one in Japan) through INTERPOL coordination with Indonesian National Police, Japanese authorities, and U.S. law enforcement demonstrated increasing international cooperation against cybercrime infrastructure.

How Does 16Shop Work?

16Shop functioned as a modular phishing kit providing customers with pre-built templates targeting diverse platforms. According to Akamai and Trend Micro research, the platform offered 117 bank-specific phishing pages incorporating authentic logos and branding for major financial institutions, email provider templates for Yahoo (including Yahoo Japan regional variant), AOL, Gmail, Hotmail (including Hotmail Japan), and generic email login forms adapting to unfamiliar domains. Later iterations expanded to Amazon and Apple/iCloud targeting, demonstrating ongoing platform development responding to evolving target preferences.

Credential collection mechanisms captured comprehensive authentication data. According to Trend Micro and Akamai analysis, 16Shop harvested usernames and passwords as victims entered them, captured security questions and answers during account recovery simulation flows, and recorded recovery email addresses and phone numbers. Collected data was stored in attacker-controlled databases with multiple exfiltration options including immediate transmission, staged collection, or combined export enabling flexible data handling based on campaign requirements.

The anti-piracy and license protection system enforced authorized use. According to Trend Micro technical analysis, each access to index.php or /account/index.php triggered API-driven license validation communicating with operator-controlled central servers. The system detected unauthorized use through blacklist enforcement and prevented unlicensed deployments from functioning. This licensing protected operator revenue by preventing piracy but also created centralized infrastructure dependency enabling law enforcement investigation.

Evasion techniques blocked security researcher analysis. According to Akamai and Trend Micro research, 16Shop maintained local IP address blacklists blocking known security researchers and company employees, specifically blacklisted McAfee and other security vendors, and obfuscated malicious payload delivery to evade automated analysis. These evasion capabilities complicated threat intelligence gathering and delayed defensive signature development.

The infrastructure model required customer-sourced hosting. According to comparative analysis, 16Shop sold template kits without providing hosting infrastructure, requiring customers to procure bulletproof hosting or other services independently. This distribution of infrastructure across thousands of customer-controlled servers complicated law enforcement disruption efforts, as operators controlled template distribution but not deployment infrastructure. The 150,000 phishing domains created using 16Shop kits represented this distributed deployment across numerous customer operations.

What Are the Limitations of 16Shop?

Customer Infrastructure Procurement Burden

Unlike subscription PhaaS platforms providing turnkey infrastructure, 16Shop required customers to source independent hosting. According to analysis, customers needed technical capability to deploy templates on servers, manage domain registration and DNS configuration, and maintain hosting relationships with bulletproof providers or compromised legitimate infrastructure. This burden limited 16Shop's appeal to technically sophisticated attackers while excluding less capable criminals preferring fully managed services.

Static Blacklist Circumvention

IP-based security researcher blocking was easily circumvented through VPNs or proxy rotation. According to Akamai analysis, while 16Shop maintained blacklists of known security vendor IP addresses, researchers could analyze templates using residential proxies, cloud instances with fresh IP addresses, or network address translation hiding actual investigation infrastructure. This evasion limitation meant blacklists provided only temporary protection before circumvention.

Lack of MFA Bypass Capabilities

16Shop captured credentials only without session token interception or real-time MFA bypass. According to comparative analysis, platforms like Caffeine/ONNX and later AiTM kits provided comprehensive session hijacking, while 16Shop offered only traditional credential harvesting. As organizations increasingly deployed MFA, 16Shop's credential-only approach became less effective compared to modern AiTM capabilities.

License Validation Infrastructure Exposure

API-based license checking created centralized infrastructure visible to law enforcement. According to Trend Micro analysis, license verification traffic patterns enabled identification of operator infrastructure, customer activities, and subscription payment flows. This centralized validation system provided investigation opportunities that fully distributed architectures lack.

Code Leak and Piracy Vulnerability

According to BleepingComputer reporting from 2023, a cracked version of 16Shop was leaked enabling unauthorized use. This code exposure allowed attackers to deploy templates without purchasing licenses, undermining operator revenue and creating attribution challenges as unlicensed deployments lacked connection to official infrastructure. The leak demonstrated that technical protection measures eventually fail against determined reverse engineering.

How Can Organizations Defend Against 16Shop?

Email Authentication and Sender Verification

Deploy DMARC/SPF/DKIM to prevent email spoofing of banking domains. According to security guidance, strict DMARC reject policies prevent 16Shop phishing emails spoofing financial institution addresses from reaching user mailboxes. Email gateways should validate sender domains match authorized infrastructure for financial institutions and organizations.

Domain Reputation and SSL Certificate Validation

Block or flag domains not matching verified banking infrastructure through SSL certificate mismatch detection and subdomain abuse identification. According to analysis, 16Shop templates often deployed on domains mimicking legitimate banks but using different certificate authorities, extended validation certificate absence, or subdomain patterns inconsistent with legitimate banking infrastructure. Automated validation flagging these inconsistencies enables phishing detection.

User Training and URL Verification Education

Educate customers and employees on URL verification, SSL certificate inspection, and legitimate communication methods for financial institutions. According to banking security guidance, users should verify exact domain matches for financial logins, check for extended validation certificates on banking sites, and understand that legitimate banks never request credentials through email links.

Multi-Factor Authentication Deployment

Implement MFA on all banking and email accounts to raise attacker effort costs. According to security guidance, while standard OTP can be compromised through additional phishing or social engineering, MFA substantially increases attack complexity compared to password-only authentication. Hardware security keys (FIDO2) provide robust protection against credential phishing that 16Shop cannot bypass.

Threat Intelligence and IOC Integration

Subscribe to threat intelligence feeds tracking 16Shop domain IOCs and update blocklists in DNS filters, web proxies, and email gateways. According to Akamai and Trend Micro guidance, security vendors documented extensive 16Shop infrastructure characteristics enabling signature-based detection. Organizations integrating these threat intelligence feeds can block known 16Shop campaigns before users encounter phishing pages.

FAQs

How widespread was 16Shop?

16Shop compromised over 70,000 users across 43 countries and created 150,000+ phishing domains according to INTERPOL investigation reporting from August 2023. The nearly six-year operational period from November 2017 through August 2023 enabled substantial accumulated impact across global victim populations. The 43-country distribution demonstrates extensive geographic reach beyond single regions or jurisdictions.

How much did 16Shop cost?

Phishing kits sold for $60-$150 each according to INTERPOL, Trend Micro, and Krebs on Security reporting. This pricing positioned 16Shop among cheaper PhaaS options available during its operational period, making it accessible to budget-conscious attackers. The fixed purchase price differed from recurring subscription models, appealing to customers preferring one-time costs over ongoing payments.

What types of accounts did 16Shop target?

Primarily banking accounts through 117 bank-specific templates, email providers including Yahoo, Gmail, Hotmail, and AOL, and later Amazon and Apple/iCloud according to Trend Micro and McAfee analysis. The banking focus reflected higher-value targets with financial access, while email targeting enabled broader credential harvesting and potential business email compromise attacks. The platform evolution adding Amazon and Apple demonstrated adaptation to changing target preferences.

Could 16Shop bypass MFA?

No. 16Shop only captured credentials without session token interception or real-time MFA bypass capabilities. According to comparative technical analysis, the platform represented traditional credential harvesting architecture predating modern AiTM techniques. Organizations deploying MFA gained protection against 16Shop attacks, though attackers could potentially use stolen credentials with social engineering to defeat MFA in separate attack stages.

Is 16Shop still active?

The primary operation was dismantled in August 2023 through operator arrest according to INTERPOL, The Register, and BleepingComputer reporting. However, leaked source code copies may remain in circulation among cybercriminals. Organizations should remain vigilant for potential template reuse by different operators or customers with existing kit purchases continuing deployments on independent infrastructure.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.