Phishing Kits & PhaaS

What Is RaccoonO365?

RaccoonO365 is a Phishing-as-a-Service (PhaaS) platform launched in July 2024 that specialized in stealing Microsoft 365 credentials and bypassing multi-factor authentication, generating over $100,000 in cryptocurrency payments and compromising accounts across 94 countries before disruption by Mi...

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

RaccoonO365 is a Phishing-as-a-Service (PhaaS) platform launched in July 2024 that specialized in stealing Microsoft 365 credentials and bypassing multi-factor authentication, generating over $100,000 in cryptocurrency payments and compromising accounts across 94 countries before disruption by Microsoft in September 2025 and the arrest of the suspected developer in Nigeria in December 2025. The operation targeted at least 5,000 Microsoft 365 credentials and conducted campaigns against over 2,300 U.S. organizations through a single tax-themed campaign, demonstrating substantial operational scale during its 14-month active period. According to Microsoft On the Issues blog published in September 2025, RaccoonO365 represented one of the fastest-growing phishing services in 2024, accumulating over 850 members in its Telegram community channel and an estimated 100-200 paying subscribers providing turnkey phishing infrastructure to cybercriminals globally.

The platform operated on subscription pricing of $355 for 30 days or $999 for 90 days, with each subscription enabling targeting of up to 9,000 email addresses per day. This bulk targeting capability positioned RaccoonO365 as a high-volume phishing platform capable of generating hundreds of millions of malicious emails annually at scale. The operation's disruption through coordinated action by Microsoft's Digital Crimes Unit, court-ordered domain seizures of 338 websites, and subsequent law enforcement arrest of the developer Joshua Ogundipe (also known as Okitipi Samuel or Moses Felix) illustrates the increasing effectiveness of public-private partnerships in combating PhaaS infrastructure.

How Does RaccoonO365 Work?

RaccoonO365 operated as a subscription-based service providing customers with automated phishing campaign infrastructure. According to Microsoft On the Issues reporting from September 2025, customers who purchased subscriptions gained access to turnkey phishing systems including email lure creation tools, credential harvesting pages, MFA evasion capabilities, and bulk targeting infrastructure supporting up to 9,000 email addresses daily. The platform automated the complete attack chain from initial email delivery through credential exfiltration, requiring minimal technical expertise from subscribers.

The attack architecture began with email lure creation using Microsoft branding and templates that crafted convincing phishing emails mimicking legitimate Microsoft communications. According to Microsoft analysis, these emails leveraged urgency tactics including account security warnings, document sharing notifications, and password expiration alerts to induce victims to click embedded links. The Microsoft branding replication included accurate logos, color schemes, and messaging patterns that closely matched legitimate Microsoft communications, reducing victim suspicion and improving click-through rates.

Credential harvesting occurred through fake login pages hosted on attacker infrastructure that victims encountered after clicking phishing links. According to Microsoft and Malwarebytes analysis from September 2025, these pages faithfully reproduced Microsoft 365 login flows including single sign-on interfaces, multi-factor authentication prompts, and error messaging. When victims entered credentials believing they were authenticating to Microsoft, RaccoonO365 infrastructure captured the username and password while simultaneously attempting MFA evasion.

MFA bypass capabilities enabled RaccoonO365 to intercept and replay multi-factor authentication codes including SMS codes, app-based tokens, and push notification responses. According to Microsoft reporting, the platform captured MFA codes entered by victims and validated them against Microsoft's legitimate servers in real time, obtaining authenticated session cookies without requiring attackers to possess victim devices or intercept communications outside the phishing flow. This automated MFA bypass differentiated RaccoonO365 from simple credential-harvesting tools that lacked session token capture capabilities.

The bulk targeting infrastructure supporting 9,000 email addresses per subscription per day enabled high-volume campaigns. According to Microsoft analysis, customers could execute sustained campaigns across thousands of targets daily, with estimated 100-200 active subscriptions potentially generating tens of thousands of phishing emails daily or hundreds of millions annually if infrastructure operated at full capacity. This industrial scale distinguished RaccoonO365 from smaller phishing operations targeting limited victim sets.

Session cookie theft provided persistent account access beyond initial compromise. According to Microsoft and InfoSecurity Magazine analysis, RaccoonO365 captured session cookies issued by Microsoft servers after successful authentication, enabling account access that survived password changes. Attackers could use stolen session cookies to access victim accounts repeatedly within cookie validity periods without requiring new authentication, facilitating prolonged exploitation including data exfiltration, lateral movement, and business email compromise attacks.

Healthcare sector targeting represented a specific operational focus. According to Microsoft reporting, at least 20 U.S. healthcare organizations were compromised by RaccoonO365 campaigns, likely due to healthcare sector's valuable patient data and potential for extortion. The healthcare targeting drew specific law enforcement attention due to the sensitive nature of compromised data and regulatory implications under HIPAA and similar healthcare data protection regulations.

How Does RaccoonO365 Differ From Other Phishing Platforms?

Aspect

RaccoonO365

Tycoon 2FA

Whisper 2FA

Launch Date

July 2024

Earlier 2024

July 2025

Primary Target

Microsoft 365

Microsoft 365

Microsoft 365

Pricing (30-day)

$355

Variable (~$250/month)

Variable

Pricing (90-day)

$999

Variable

Variable

Daily email capacity

9,000 per subscription

Not publicly disclosed

Not publicly disclosed

Estimated emails/year

Hundreds of millions

Comparable high volume

Close to 1 million/month

Status (Feb 2026)

Disrupted Sept 2025

Active

Active

Developer Status

Arrested Dec 2025 (Nigeria)

Unknown

Unknown

Known victims

5,000+ credentials, 94 countries

Dominant market share (95.59% Aug 2025)

Third-most prevalent globally

The comparison reveals RaccoonO365's differentiation through explicit daily targeting capacity limits rather than feature-based pricing. According to Microsoft and comparative analysis, platforms like Tycoon 2FA and Whisper 2FA typically price based on feature tiers or general subscription access without publicizing specific volume limits. RaccoonO365's 9,000 emails per subscription per day represented clear volume-based pricing that enabled customers to plan campaign scales and assess cost-effectiveness for different targeting strategies.

The $355 30-day and $999 90-day pricing positioned RaccoonO365 in the mid-to-premium tier compared to budget offerings like Sneaky 2FA at $200 monthly. According to pricing analysis, the 90-day option at $999 represented approximately $333 monthly, providing modest discount compared to the $355 monthly rate. This pricing structure incentivized longer-term subscriptions while generating substantial upfront revenue for operators.

RaccoonO365's disruption through law enforcement action distinguished it from most competing platforms that continue operating. According to The Hacker News and The Record from Recorded Future reporting from September and December 2025, Microsoft's Digital Crimes Unit obtained court orders seizing 338 RaccoonO365-associated domains in September 2025, followed by the December 2025 arrest of suspected developer Joshua Ogundipe in Nigeria through coordination with FBI and Nigerian law enforcement. This successful disruption and attribution represents relatively rare outcomes in the PhaaS ecosystem where most platforms continue operating indefinitely or transition to successor platforms under new branding.

The healthcare sector targeting concentration differentiated RaccoonO365 from platforms conducting general opportunistic campaigns. According to Microsoft reporting, the compromise of at least 20 U.S. healthcare organizations indicated either deliberate healthcare targeting strategy or concentration of customer base purchasing subscriptions specifically for healthcare compromise objectives.

Why Does RaccoonO365 Matter?

RaccoonO365 demonstrates the substantial scale achievable by PhaaS platforms during relatively brief operational windows. The platform operated for approximately 14 months from July 2024 through September 2025, yet compromised at least 5,000 credentials across 94 countries, generated over $100,000 in cryptocurrency revenue, and accumulated 100-200 paying subscribers according to Microsoft analysis. This rapid scaling illustrates how PhaaS platforms can achieve significant impact without requiring years of operational development.

The successful disruption through public-private coordination provides a template for combating PhaaS infrastructure. According to Microsoft On the Issues blog from September 2025, Microsoft's Digital Crimes Unit collaborated with Cloudflare, law enforcement agencies including FBI, and international partners to execute coordinated domain seizures, infrastructure disruption, and ultimately developer attribution and arrest. This multi-stakeholder approach combining technical capabilities of platform providers, legal authority of law enforcement, and intelligence resources from multiple jurisdictions demonstrates effectiveness of coordinated action against previously resilient PhaaS operations.

The developer arrest in Nigeria illustrates the expanding international law enforcement cooperation against cybercrime. According to The Record from Recorded Future reporting from December 2025, Nigerian authorities arrested Joshua Ogundipe based on intelligence from Microsoft and FBI, representing increasing willingness of nations to act against cybercriminals operating within their borders. This cooperation challenges the historical safe-haven dynamics where cybercriminals operated from jurisdictions unlikely to extradite or prosecute, reducing operational security for PhaaS developers relying on geographic protection.

The healthcare sector targeting drew specific regulatory and law enforcement attention. According to Microsoft reporting, compromise of healthcare organizations involves sensitive patient data protected under HIPAA regulations, creating legal liability beyond standard data breach scenarios and potentially elevating law enforcement prioritization. The targeting of at least 20 healthcare organizations likely contributed to the intensity of disruption efforts and the resources allocated to investigation.

RaccoonO365's revenue of over $100,000 illustrates the financial viability of PhaaS operations. According to Microsoft and Malwarebytes analysis, 100-200 paying subscriptions at $355-999 pricing generates sustainable income for operators while remaining affordable for customers compared to developing custom phishing infrastructure. This economic model explains the continued proliferation of PhaaS platforms despite law enforcement pressure and platform disruptions.

What Are the Limitations of RaccoonO365?

Centralized Infrastructure Vulnerability

RaccoonO365 operated through centralized hosting infrastructure where all customer campaigns depended on shared servers and domains. According to Microsoft analysis from September 2025, this centralization enabled comprehensive disruption through domain seizure, as the 338 domain seizure affected all subscribers simultaneously rather than requiring individual customer infrastructure targeting. Distributed PhaaS architectures where customers deploy independent infrastructure demonstrate greater resilience to single-point-of-failure disruption, suggesting centralized models sacrifice operational security for operational efficiency and lower customer technical requirements.

Financial Transaction Traceability

Cryptocurrency payment processing created financial audit trails that enabled law enforcement attribution. According to The Record reporting from December 2025, blockchain analysis allowed investigators to trace cryptocurrency flows and identify accounts receiving RaccoonO365 subscription payments. While cryptocurrency provides greater anonymity than traditional payment systems, blockchain transparency enables sophisticated analysis linking addresses to individuals through exchange accounts, transaction patterns, and operational security failures. This traceability contributed to identification and arrest of the developer.

Single Developer Concentration Risk

The operation's dependence on a single developer Joshua Ogundipe created single point of failure for platform continuity. According to The Hacker News and The Record reporting from December 2025, Ogundipe's arrest immediately terminated ongoing development, customer support, and infrastructure maintenance. Distributed operations with multiple operators or organizational structures demonstrate greater resilience to individual arrests, while single-developer platforms face existential risk from law enforcement attribution.

Telegram Community Visibility

Operating an 850-member Telegram community channel created operational visibility that facilitated law enforcement monitoring. According to Microsoft reporting from September 2025, open recruitment through public Telegram channels enabled security researchers and law enforcement to observe customer discussions, identify infrastructure patterns, and document operational characteristics. More sophisticated operations using invitation-only communities, vetting procedures, or distributed communication channels reduce this visibility exposure.

Healthcare Targeting Regulatory Attention

The compromise of at least 20 U.S. healthcare organizations drew specific law enforcement and regulatory attention due to HIPAA compliance implications and the sensitive nature of healthcare data. According to Microsoft analysis, healthcare targeting likely elevated RaccoonO365 on law enforcement priority lists compared to platforms targeting less regulated sectors. This regulatory attention may have accelerated investigation resources allocation and international coordination leading to developer arrest.

How Can Organizations Defend Against RaccoonO365?

Advanced Email Filtering and Authentication

Organizations should implement advanced email filtering that blocks phishing emails using stolen Microsoft branding with suspicious sender patterns. According to InfoSecurity Magazine and Help Net Security guidance from September 2025, email security gateways should verify sender addresses against Microsoft's legitimate infrastructure using SPF, DKIM, and DMARC authentication protocols. Strict DMARC policies should reject emails failing authentication checks rather than delivering to spam folders, preventing RaccoonO365 phishing emails from reaching user mailboxes. URL analysis should detonate links in sandbox environments to identify phishing pages before delivery.

Hardware Security Key Deployment

The most effective defense against RaccoonO365 and similar MFA-bypass platforms is deploying FIDO2-certified hardware security keys instead of SMS or app-based MFA. According to Microsoft and InfoSecurity Magazine guidance, hardware security keys use WebAuthn protocol that cryptographically binds authentication to legitimate domains. When RaccoonO365 presents phishing pages from fraudulent domains, hardware keys detect the domain mismatch and refuse to complete authentication. Organizations should prioritize hardware key deployment for high-value accounts, administrative users, and employees with access to sensitive data.

Conditional Access and Device Compliance

Microsoft 365 administrators should implement Conditional Access policies requiring device compliance and detecting anomalous authentication patterns. According to Help Net Security and Microsoft guidance from 2025, policies should block logins from unusual geographic locations or IP addresses, require re-authentication for risky sign-in attempts, enforce device compliance status before granting access, and implement impossible travel detection that flags authentication from geographically distant locations within short timeframes. These policies disrupt automated credential replay and session cookie exploitation.

Email Header Analysis and Monitoring

Security operations centers should monitor for spoofed Microsoft infrastructure headers in email traffic. According to Microsoft analysis, RaccoonO365 phishing emails often contained subtle anomalies in email headers including mismatched sender domains, unusual routing paths, and spoofed authentication indicators. Automated analysis comparing email headers against known Microsoft infrastructure patterns can identify phishing emails before users interact with them. SIEM systems should alert on emails claiming Microsoft origin but originating from non-Microsoft infrastructure.

Login Pattern Analysis and Geo-fencing

Organizations should implement monitoring for login patterns characteristic of RaccoonO365 compromise including authentication from unusual geographic locations shortly after phishing email delivery, rapid sequential login attempts from different IP addresses, and authentication during unusual hours inconsistent with user's typical patterns. According to Microsoft security guidance, geo-fencing policies can block logins from countries where the organization has no legitimate operations, reducing attack surface from international threat actors. Azure AD Identity Protection and similar platforms provide automated risk scoring based on these behavioral indicators.

FAQs

How much did RaccoonO365 subscriptions cost?

A 30-day RaccoonO365 subscription cost $355, while a 90-day subscription was priced at $999. According to Microsoft On the Issues reporting from September 2025, each subscription allowed targeting up to 9,000 email addresses per day, enabling customers to conduct large-scale phishing campaigns. The pricing positioned RaccoonO365 in the mid-to-premium tier of the PhaaS market, comparable to platforms like Mamba 2FA and Tycoon 2FA but more expensive than budget alternatives like Sneaky 2FA at $200 monthly. The 90-day option provided modest discount compared to purchasing three consecutive monthly subscriptions.

How many Microsoft 365 accounts were compromised by RaccoonO365?

Microsoft reported that since July 2024, RaccoonO365 kits were used to steal at least 5,000 Microsoft 365 credentials from organizations across 94 countries. According to Microsoft On the Issues blog published in September 2025, this figure represents confirmed compromises documented through Microsoft's investigation and may undercount actual victim totals. The global distribution across 94 countries indicates RaccoonO365's extensive reach and appeal to threat actors targeting diverse geographic regions. A single tax-themed campaign targeted over 2,300 U.S. organizations, demonstrating the platform's high-volume capabilities.

What happened to RaccoonO365?

Microsoft's Digital Crimes Unit seized 338 websites associated with RaccoonO365 in September 2025 using court orders obtained through legal action. According to The Hacker News and The Record reporting from September and December 2025, this infrastructure seizure disrupted all customer campaigns simultaneously. Subsequently, Nigerian authorities arrested the suspected developer Joshua Ogundipe (also known as Okitipi Samuel or Moses Felix) in December 2025 following coordination with Microsoft and FBI. The combination of infrastructure seizure and developer arrest effectively terminated RaccoonO365 operations, though successor platforms or operator rebranding remain possible.

Why did RaccoonO365 particularly target healthcare organizations?

Healthcare organizations were targeted because they typically handle sensitive patient data protected under HIPAA regulations and may be more likely to pay ransoms if additional extortion demands were made following compromise. According to Microsoft reporting from September 2025, at least 20 U.S. healthcare organizations were compromised by RaccoonO365 campaigns. Healthcare sector targeting creates opportunities for data theft, ransomware deployment, and business email compromise fraud. The regulatory implications and sensitive nature of healthcare data may have contributed to elevated law enforcement prioritization of RaccoonO365 investigation.

How does RaccoonO365's pricing compare to other phishing services?

RaccoonO365 offered subscription-based pricing of $355-999 for defined periods with unlimited daily targeting up to 9,000 addresses. According to comparative analysis, platforms like Tycoon 2FA and Mamba 2FA charge approximately $250 monthly while budget options like Sneaky 2FA cost $200 monthly. RaccoonO365's higher pricing likely reflected the explicit volume capacity, professional infrastructure, and technical support. The subscription model differed from per-campaign pricing, providing customers with predictable costs and ability to conduct sustained campaigns within subscription periods. The daily targeting capacity of 9,000 emails provided clear value proposition for high-volume operations.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.