By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Cyberessentials Technology MagazineCyberessentials Technology MagazineCyberessentials Technology Magazine
  • Tech news
  • PC & Hardware
  • Mobile
  • Software
  • Gadget
  • Security
  • AI
  • Gaming
  • Marketing
  • WWW
Search
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: US Government Takes Down Massive Dark Web Credit Card Marketplace
Share
Sign In
Notification Show More
Font ResizerAa
Cyberessentials Technology MagazineCyberessentials Technology Magazine
Font ResizerAa
  • Gadget
  • Technology
  • Mobile
Search
  • Tech news
  • PC & Hardware
  • Mobile
  • Software
  • Gadget
  • Security
  • AI
  • Gaming
  • Marketing
  • WWW
Have an existing account? Sign In
Follow US
  • Contact
  • Blog
  • Complaint
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Security

US Government Takes Down Massive Dark Web Credit Card Marketplace

admin
Last updated: June 5, 2025 11:18 pm
admin
Share
woman in black dress illustration
SHARE

The US Department of Justice just delivered a crushing blow to cybercriminals worldwide. They seized 145 domains and cryptocurrency funds from BidenCash, one of the largest illegal marketplaces for stolen credit cards on the dark web.

Contents
What was BidenCash exactly?The numbers are staggeringWhat information did they steal?BidenCash expanded beyond credit cardsHow the takedown happenedWhy BidenCash became so popularThe global impactWhat happens to seized cryptocurrency?Part of a larger crackdownWhat this means for ordinary peopleThe cat and mouse game continues

What was BidenCash exactly?

Think of BidenCash as the Amazon of stolen credit cards. But instead of selling books and electronics, this dark web marketplace specialized in selling your personal financial information to criminals.

The platform launched in March 2022. It quickly became a go-to destination for cybercriminals looking to buy and sell stolen credit card data. Over 117,000 customers used this illegal marketplace during its three-year run.

BidenCash administrators were smart about their business model. They charged a fee for every single transaction on their platform. This fee structure helped them generate more than $17 million in revenue from their illegal activities.

The numbers are staggering

The scale of BidenCash’s operation was massive. The marketplace facilitated the trafficking of over 15 million payment card numbers and personally identifiable information.

But here’s where it gets really wild. Between October 2022 and February 2023, BidenCash did something unprecedented. They published 3.3 million stolen credit cards for free. Why would they give away their product for free? It was pure marketing genius from a criminal perspective.

“We are thrilled to have reached our first year anniversary as an online store, and we couldn’t have done it without your support!” the BidenCash administrators wrote in one of their promotional announcements.

This free giveaway was their way of attracting new customers and showing off the quality of their stolen data. Think of it like a free sample at the grocery store, except the samples were your credit card information.

What information did they steal?

The stolen data wasn’t just credit card numbers. BidenCash collected everything criminals needed to commit identity theft and financial fraud:

• Credit card numbers
• Expiration dates
• Card Verification Value (CVV) numbers
• Account holder names
• Home addresses
• Email addresses
• Phone numbers
• Social Security Numbers for US cardholders

Of the 2.1 million compromised credit cards released in February 2023, 50% belonged to US-based people or entities. American consumers were clearly a prime target for these cybercriminals.

BidenCash expanded beyond credit cards

By 2023, BidenCash wasn’t content with just selling stolen credit cards. They expanded their criminal empire to include hacking services.

The marketplace began offering SSH server access to buyers for as low as $2. SSH access essentially gives hackers the keys to remote servers. With this access, criminals could launch devastating cyberattacks including:

• Data theft operations
• Ransomware attacks
• Cryptocurrency mining on hijacked servers
• Brute force attacks against other systems

“This poses a significant risk as threat actors can leverage this power to conduct a wide range of malicious activities,” cybersecurity experts warned at the time.

How the takedown happened

This wasn’t a solo operation by US authorities. The takedown of BidenCash required international cooperation on a massive scale.

The operation was led by the US Secret Service and the Federal Bureau of Investigation (FBI). But they had crucial help from international partners including:

• Dutch National Police
• The Shadowserver Foundation
• Searchlight Cyber

On Wednesday, authorities announced they had successfully seized approximately 145 clearnet and dark web domains associated with BidenCash. The seized domains now redirect visitors to a US law enforcement-controlled server.

But the domains weren’t the only thing authorities grabbed. They also obtained court orders to seize cryptocurrency funds that BidenCash used to receive payments from illegal sales. The exact amount of cryptocurrency seized hasn’t been disclosed, but given BidenCash’s $17 million revenue, it’s likely substantial.

Why BidenCash became so popular

BidenCash didn’t emerge in a vacuum. It filled a gap left by the shutdown of other major carding marketplaces.

The platform launched specifically to replace Joker’s Stash, which had been shut down a year earlier. BidenCash also took over customers from other defunct carding forums like UniCC.

Within less than a year of operation, BidenCash became one of the top carding marketplaces according to threat intelligence rankings. Their aggressive marketing tactics, including those massive free data dumps, helped them quickly gain market share in the criminal underworld.

The global impact

The BidenCash data breaches affected victims worldwide. The stolen credit cards came from customers in:

• United States (965,846 records)
• Mexico (97,665 records)
• China (97,003 records)
• United Kingdom (86,313 records)
• Canada (36,906 records)
• India (36,672 records)

But the damage goes far beyond expired credit cards. Even after credit cards expire, the personal information from these breaches can be used for years to commit identity theft, phishing scams, and social engineering attacks.

What happens to seized cryptocurrency?

The US government has been seizing cryptocurrency from criminal operations since 2013. But what they do with that crypto has changed dramatically.

Previously, the US Marshals Service would auction off seized Bitcoin just like they do with cars and real estate from criminal enterprises.

But in March 2025, President Trump signed an executive order establishing a strategic Bitcoin reserve. Now the government plans to hold onto seized cryptocurrency as part of a national digital asset stockpile.

According to White House officials, the government currently holds around 200,000 Bitcoins worth over $20 billion at current prices.

Part of a larger crackdown

The BidenCash takedown isn’t happening in isolation. It’s part of a broader international effort to combat cryptocurrency-enabled crime on the dark web.

Just last month, Operation RapTor resulted in 270 arrests across 10 countries and the seizure of around $200 million in assets, much of it in cryptocurrency.

Law enforcement agencies are clearly getting better at tracking and disrupting these criminal networks. The days when dark web marketplaces could operate with impunity are rapidly coming to an end.

What this means for ordinary people

The shutdown of BidenCash is great news for anyone who’s ever had their credit card information stolen. But it’s important to understand that new marketplaces will inevitably emerge to fill the void.

Cybersecurity experts recommend several steps to protect yourself:

• Monitor your credit card statements regularly
• Use virtual credit cards when possible
• Enable multi-factor authentication on all accounts
• Consider credit monitoring services
• Never click suspicious links in emails or texts

The BidenCash case also highlights how personal information can circulate in criminal networks for years after the initial theft. “The presence of email addresses and full information will make the victims of this leak vulnerable to other attacks, such as phishing, identity theft, and scams, long past the expiration of their card details,” cybersecurity researchers warned.

The cat and mouse game continues

While the takedown of BidenCash represents a significant victory for law enforcement, it’s important to remember that this is an ongoing battle.

Criminal marketplaces have shown remarkable resilience over the years. When major platforms get shut down, new ones typically emerge within months to serve the same criminal customer base.

However, each successful takedown operation provides valuable intelligence that helps law enforcement understand how these networks operate. This knowledge makes future operations more effective and helps authorities stay one step ahead of the criminals.

The international cooperation demonstrated in the BidenCash case also sends a clear message to cybercriminals: there’s nowhere to hide in today’s connected world.

As digital crime continues to evolve, so too must the methods used to combat it. The BidenCash takedown shows that when international law enforcement agencies work together, they can strike devastating blows against even the most sophisticated criminal enterprises.

Iranian hacker faces 30 years for holding american cities digital hostage
Top 6 VPN Software in 2025: Expert Reviews & Comparison
New PumaBot botnet attacks Linux IoT devices with stealthy SSH brute-force tactics
Cisco Cybersecurity Certifications: Your Complete Guide to a Booming Career in 2025
Coinbase data breach: How bribed insiders leaked 70k user profiles

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article vpn logo on laptop Top 6 VPN Software in 2025: Expert Reviews & Comparison
Next Article Vpn software logo What is a VPN? VPN meaning
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

Free Cybersecurity Courses & Certificates [2025]: Your Complete Guide to Starting a Career in Cybersecurity
Security
Google Cybersecurity Certificate
Google Cybersecurity Certification – All You Need To Know About
Security
ethical hacker working in cybersecurity in front of computers
10 Most Popular Cybersecurity Certifications That Will Boost Your Career in 2025
Security
Vpn software logo
What is a VPN? VPN meaning
Guides Security Software
closeup photo of turned-on blue and white laptop computer
10 Steps for Protecting Your Organization from Cyber Threats
Security
person holding black iphone 5
Cyber security tool for anonymous browsing ABBR. For crossword use
Security
man in crew neck shirt
The Celebgate scandal: How hackers stole intimate photos of Hollywood’s biggest stars
Security Technology
macbook pro on brown wooden table
Secure Your Online Activities with a VPN: Tips and Tricks
Security
banner banner
Cyberessentials.org
Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!
//

Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

Support

  • PRIVACY NOTICE
  • YOUR PRIVACY RIGHTS
  • INTEREST-BASE ADSNew
  • TERMS OF USE
  • OUR SITE MAP

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

[mc4wp_form id=”1616″]

Cyberessentials Technology MagazineCyberessentials Technology Magazine
Follow US
© 2025 Cyberessentials.org. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?