In partnership with

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

The Future of Shopping? AI + Actual Humans.

AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.

Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.

The data shows:

  • Only 10% of shoppers buy through AI-recommended links

  • 87% discover products through creators, blogs, or communities they trust

  • Human sources like reviews and creators rank higher in trust than AI recommendations

The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.

Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.

U.S. Authorities Seize Phishing Infrastructure Behind $28M Bank Account Takeover Scheme

The U.S. Department of Justice has seized a domain and backend infrastructure used in a large-scale bank account takeover operation that leveraged malicious online ads and phishing websites. The campaign attempted to steal nearly $28 million from U.S. victims, with confirmed losses exceeding $14 million. The takedown highlights the continued effectiveness—and scale—of ad-driven credential theft operations.

Context

Account takeover (ATO) fraud has accelerated sharply in 2025, driven by the availability of phishing kits, infostealer malware, and large underground credential markets. Financial institutions remain a primary target, as stolen login credentials can be rapidly monetized before victims or banks detect suspicious activity.

According to federal data, ATO-related losses in the U.S. have already surpassed $262 million this year, underscoring the systemic risk posed by credential-based fraud.

What Happened

The U.S. Department of Justice announced the seizure of the domain web3adspanels.org, which hosted a backend panel used by cybercriminals to manage thousands of stolen banking credentials.

Investigators determined that the threat actors placed malicious advertisements on major search engines, including Google and Bing. These ads redirected users to fake banking websites designed to closely mimic legitimate login portals.

Victims who entered their credentials unknowingly handed direct access to their bank accounts to the attackers, who then attempted to drain funds rapidly.

Technical Breakdown

The seized infrastructure functioned as a centralized credential management system. Once credentials were harvested through phishing pages, they were stored, organized, and manipulated through a web-based control panel.

This approach allowed attackers to:

  • Track which credentials were valid

  • Prioritize high-value accounts

  • Coordinate withdrawals and transfers

  • Reuse credentials across multiple financial institutions

Estonian law enforcement assisted by preserving server data hosting both phishing pages and stolen login databases, enabling deeper forensic analysis.

Impact Analysis

The Federal Bureau of Investigation has identified nearly 20 U.S. victims so far, including two companies. While attackers attempted to steal roughly $28 million, confirmed losses are estimated at $14.6 million.

Authorities have not announced arrests or charges, suggesting the investigation remains active and may involve additional infrastructure or operators.

Why It Matters

This case illustrates how low-cost digital advertising can be weaponized at scale. Search-based phishing remains highly effective because users often trust top-ranked or sponsored results, especially when interacting with financial services.

The takedown also reinforces the importance of disrupting backend infrastructure, not just phishing sites, to meaningfully degrade criminal operations.

Expert Commentary

The announcement follows recent disclosures by Troy Hunt, operator of Have I Been Pwned, who revealed that the FBI shared 630 million compromised passwords for analysis.

Hunt’s review showed the dataset originated from multiple sources, including infostealer malware and cybercrime markets, highlighting how fragmented—but highly reusable—credential theft ecosystems have become.

Key Takeaways

  • Ad-driven phishing remains a primary driver of bank account takeover fraud

  • Centralized backend panels enable efficient credential exploitation at scale

  • Nearly $15 million in confirmed losses stem from this single operation

  • Search engine ads continue to be abused for high-trust phishing delivery

  • Credential reuse dramatically amplifies financial risk

  • Infrastructure seizures disrupt operations but rarely end campaigns outright

Keep Reading

No posts found