Darcula PhaaS 3.0: Instant Phishing Kits for Any Brand

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 3 min read

Cybercriminals Can Now Clone Any Brand's Site in Minutes Using Darcula PhaaS v3

The Darcula phishing-as-a-service (PhaaS) platform has introduced its third version, allowing attackers to clone legitimate websites and create phishing versions swiftly. This transformation reduces the technical expertise required for large-scale phishing attacks. According to Netcraft, this represents a significant shift in criminal capabilities, allowing cybercriminals to target any brand with customizable phishing campaigns. More than 95,000 new Darcula phishing domains and nearly 31,000 IP addresses have been blocked since the initial exposure of this threat.

The new version allows users to generate phishing kits on-demand by simply providing the URL of the brand to be impersonated. The platform uses a browser automation tool like Puppeteer to extract the HTML and assets needed for the phishing page. Once generated, the phishing content can be injected into the cloned site, allowing attackers to create pages that closely mimic the original brand's appearance.

The platform also features a user-friendly admin dashboard, making it easier for fraudsters to manage campaigns and monitor results. The automated process of generating phishing kits significantly lowers the barrier for entry into cybercrime.

Key features of Darcula v3 include:

  • On-demand phishing kit generation.
  • Customizable front-end design.
  • Admin dashboards for campaign management.
  • Tools for converting stolen credit card details into virtual images for illicit use.

For more information, see Netcraft’s detailed analysis here.

Darcula PhaaS Can Now Auto-Generate Phishing Kits for Any Brand

The Darcula platform's third major version allows users to create DIY phishing kits targeting any brand without prior technical skills. This new capability is set to enhance the accessibility of phishing attacks, making it easier for cybercriminals to launch campaigns. The release, known as the Darcula Suite, offers features such as IP filtering, automated credit card theft, and campaign performance measurement.

Dracula hacking
Netcraft has verified that the new features in the beta version are functional and effective. The platform enables the cloning of websites using Puppeteer, copying the necessary elements to maintain the original design. The process involves inserting a brand's URL, allowing the platform to generate templates for the attack.

The upgraded toolkit includes:

  • Pre-made templates for various phishing scenarios.
  • A simplified admin interface for managing campaigns.
  • Anti-detection features to evade cybersecurity measures.

To learn more about the latest developments, refer to this link.

The Bleeding Edge of Phishing: Darcula-Suite 3.0 Enables DIY Phishing of Any Brand

Darcula-suite represents a significant advancement in phishing, allowing even non-technical criminals to create sophisticated phishing kits. The new version targets any brand globally, increasing the risk of cyberattacks. Since its initial exposure, Netcraft has blocked over 90,000 phishing domains linked to Darcula and taken down more than 20,000 fraudulent websites.

Reddit logo
The platform's features include:

  • DIY phishing kit generation for any brand.
  • Improved admin dashboards for campaign management.
  • Notifications for successful phishing attempts via Telegram.

The ease of use and advanced capabilities of Darcula 3.0 ensure that phishing attacks will likely increase in volume and sophistication. For detailed insights, see Netcraft’s comprehensive analysis here.

For organizations looking to protect against these emerging threats, it's crucial to adopt proactive cybersecurity measures and monitor for suspicious activities. Netcraft offers solutions for detecting and blocking phishing attempts, ensuring your brand's safety against evolving cyber threats.

Explore our services at undefined for more information on how we can help you combat cybersecurity risks.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article