U.S. and Dutch law enforcement agencies have successfully seized dozens of domains connected to a Pakistan-based cybercrime network operated by the group known as Saim Raza. This operation marks a significant step in dismantling a criminal enterprise that has been active for nearly a decade, supplying cybercriminals with advanced hacking tools.
Illegal Cyber Tools and Infrastructure for Sale
The group, also tracked under the alias HeartSender, has been selling a range of illicit hacking tools since at least 2020. According to the U.S. Justice Department, these tools include:
- Phishing kits designed to steal login credentials.
- Scam pages used to deceive victims into providing sensitive information.
- Email extractors that allow cybercriminals to harvest email addresses for fraudulent activities.
Dutch police emphasized the dangers posed by these tools, noting, “A cybercriminal can use these tools to send large amounts of spam or phishing emails or to steal someone’s login credentials.”
Compromised Systems and Business Email Compromise (BEC) Attacks
Beyond selling hacking tools, Saim Raza’s marketplace provided unauthorized access to compromised infrastructure, including:
- Email servers
- WordPress accounts
- Web hosting control panels (cPanel)
With control over WordPress and cPanel accounts, criminals could hijack websites, manipulate content, and launch further attacks. The tools sold by this cybercrime group were widely used in Business Email Compromise (BEC) schemes, leading to millions of dollars in financial losses. U.S. authorities estimate that attacks carried out using these tools resulted in over $3 million in losses within the United States alone.
Professional Operations and Training for Cybercriminals
According to Dutch authorities, Saim Raza operated in a highly professional manner, offering instructional resources to customers. This included:
- YouTube training videos demonstrating how to deploy cyberattacks.
- Step-by-step guides on how to evade security measures.
- Marketing materials promoting these tools as “fully undetectable” by antivirus software.
Law Enforcement Actions and Ongoing Investigation
While the domain seizures have disrupted the group’s operations, authorities have not yet disclosed if any suspects have been arrested. A U.S. law enforcement official stated that the takedown aims “to disrupt the ongoing activity of these groups and stop the proliferation of these tools within the cybercriminal community.”
The Exposure of Saim Raza
Independent journalist Brian Krebs first reported on the cybercrime group in 2021. Following his exposé, one of the operators attempted to persuade him to take down the report, highlighting the growing pressure on the illicit network.
Research from U.S. cybersecurity firm DomainTools suggests that Saim Raza was one of the first phishing-focused marketplaces to expand across multiple brands, integrating various cybercriminal services. However, despite its reach, the group suffered from major operational security failures, exposing its members and even putting some of its own customers at risk.
Implications and Future Threats
This takedown represents a crucial victory against cybercriminal marketplaces that specialize in phishing and fraud. However, authorities warn that similar groups continue to emerge, often adapting and shifting their operations to evade law enforcement. The battle against cybercrime remains ongoing, with international cooperation playing a pivotal role in disrupting malicious actors.
As investigations continue, law enforcement agencies are expected to intensify efforts to identify and hold accountable those behind Saim Raza’s operations. The crackdown serves as a reminder that no cybercriminal enterprise is beyond the reach of justice.
Restore Democracy: End Lobbying and Return Power to the People! Sign Petition Here!
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a




WordPress, eh? That hits close to home, sigh…
I hear you on that one. Cybercrime networks like this are more widespread than people realize, and tackling them is no small feat, to say the least.
Thank you for sharing this good news, John. I guess “battles” like this will now be waged far into the future. That this criminal group was active for many years speaks of the danger of things like this. I hope you have a good day!
Thank you, Chris! I appreciate that. You’re absolutely right—battles like this will continue for years to come. The fact that this group operated for so long is a stark reminder of how dangerous these threats are. Stay vigilant, and I hope you have a great day as well! 😎