Darcula PhaaS steals 884,000 credit cards via phishing texts
The Darcula phishing-as-a-service (PhaaS) platform stole 884,000 credit cards from 13 million clicks on malicious links sent via text messages to targets worldwide.
The cyber heist was done over seven months between 2023 and 2024, so it does not reflect the total amount the cybercrime platform has helped to steal.
These numbers come from coordinated research by investigators from NRK, Bayerischer Rundfunk, Le Monde, and Norwegian security firm Mnemonic, who identified 600 operators (cybercrime clients) and the platform’s main creator and seller.
Darcula’s rapid rise
Darcula is a PhaaS platform that targets Android and iPhone users in over 100 countries using 20,000 domains that spoof well-known brands, aiming to steal people’s account credentials.
These phishing texts commonly pretend to be road toll fines or package shipping notifications that include links to phishing sites.
Netcraft researchers, who were the first to highlight the rising threat in March 2024, noted that Darcula was set apart from similar cybercrime services via its ability to use RCS and iMessage instead of SMS, which made its attacks more effective.
In February 2025, the same researchers reported that Darcula had undergone a significant evolution, now allowing operators to auto-generate phishing kits for any brand, while also implementing new stealth features, a credit card to virtual card converter, and a simplified admin panel.
In April 2025, Netcraft saw the introduction of generative AI in Darcula, allowing cybercriminals to craft custom scams with the help of LLM tools in any language and for any topic.

Source: Mnemonic
Lifting the lid
Mnemonic’s investigation, which involved reverse-engineering the phishing infrastructure, led to the discovery of a powerful phishing toolkit named ‘Magic Cat,’ which is the backbone of the Darcula operation.
The researchers also infiltrated the Telegram group associated with the Darcula operation, uncovering photos of SIM farms, modems, and evidence of lavish lifestyles financed by the scams.
Through OSINT work and passive DNS analysis, they traced the operation’s digital footprints to a Chinese individual and a GitHub developer account, among other things.
NRK claims the individual is a 24-year-old from Henan, China, linked to a company that is believed to have created Magic Cat.
A spokesperson of the firm told the press that Yucheng was a former employee, and denied any involvement in fraud, claiming that it only sells “website-creation software.”
NRK notes that, although the company acknowledged that Magic Cat is used for phishing, and claimed they would shut it down, a new version was released.
In a separate post, NRK reveals about 600 individual scammers using Darcula to steal payment card information from victims globally, with 884,000 cards captured worldwide.
Operators are organized into closed Telegram groups, which NRK monitored for over a year, finding that most communicate in Chinese and run SIM farms and hardware setups to send mass text messages and process stolen cards via terminals.
NRK’s report highlights operators with very high volumes of malicious traffic facilitated by Darcula, including a Thai-based user, ‘x66/Kris,’ who appears to be high in the hierarchy.
All information the researchers and investigators gathered was shared with the applicable law enforcement authorities.
Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Source link