{"id":53493,"date":"2023-09-01T00:00:00","date_gmt":"2023-09-01T00:00:00","guid":{"rendered":"urn:uuid:fd9e5191-a0bd-4bc4-0281-41f613ba9b32"},"modified":"2023-09-01T00:00:00","modified_gmt":"2023-09-01T00:00:00","slug":"revisiting-16shop-phishing-kit-trend-interpol-partnership","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/","title":{"rendered":"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/revisiting-16shop-phishing-kit-trend-interpol-partnership:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/23\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"33.971385542169\">\n<div readability=\"16.753012048193\">\n<p><span class=\"body-subhead-title\">Analysis<\/span><\/p>\n<p>Like other phishing kits, 16shop has a licensing mechanism that allows its subscribers to set up their own phishing panel and generate a lot of phishing sites and potential victims. It is a tool that lets cybercriminals <a href=\"https:\/\/www.akamai.com\/blog\/security\/16shop-commercial-phishing-kit-has-a-hidden-backdoor\">setup phishing operations easily<\/a> without needing to code from scratch. Cybercriminal subscribers only need to change the configuration file once they get the full package.<\/p>\n<p>The panel has options for choosing the target brands, along with the prices. Scanning from the prices and payment methods\u2019 options, the American Express (AMEX) scam page is the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cash-app-phishing-kit-deployed-in-the-wild-courtesy-of-16shop\/\">most expensive<\/a>, likely due to the smaller number of \u201cpremium\u201d credit card users.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"45.039848197343\">\n<div readability=\"36.22770398482\">\n<p>The <i>16shop.co<\/i> page can receive payment via a bank account based in Indonesia, or through a Bitcoin wallet. The cost ranges from US$60 to $70, except for the kit that targets AMEX users, which costs US$150. The Cash App mobile payment service, which was subsequently included among the targeted payment platforms in <a href=\"https:\/\/www.zerofox.com\/blog\/16shop-cash-app-phishing-kit\/\">2021<\/a>, also costs $70. 16shop also provides a checker for stolen accounts in different companies such as Traveloka, Xiaomi, Etsy, Apple, and Malaysia Airlines.<\/p>\n<p>In the phishing kits, we found some configurations like <i>verify.ini<\/i> in the preloaded messages in different languages, which indicates the targeted countries (aside from English-speaking countries) such as Japan, China, France, Spain, Malaysia, Germany, Thailand, and the Netherlands. The <a href=\"https:\/\/www.youtube.com\/watch?v=zFsbmoInuKk\">features of 16shop<\/a> also provides the usual anti-phishing techniques such as anti-bot features like distinguishing security-related IP addresses, anti-sandbox, or geo-located restriction of access), get bank accounts (US only), and get Verified By Visa (VBV) or 3D Secure (3DS) of credit cards.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32.859424920128\">\n<div readability=\"12.563897763578\">\n<p>We tracked these phishing servers and found them mostly hosted by cloud service provider <a href=\"https:\/\/www.digitalocean.com\/\">Digital Ocean<\/a>. Cybercriminals use such services to ease out attack efforts and avoid the likelihood of detection by depending on a popular service providers\u2019 addresses for deployment. For example, the IP server <i>128[.]199[.]154[.]155<\/i> contains a lot of ZIP files analyzed as phishing kits. We found <a href=\"https:\/\/urlscan.io\/search\/#hash%3A837654563cf669fd0a1e676c83b6bf540d733e9a57ddcd6da8cdf1b5e44e9fc5\">more<\/a> phishing sites with expired 16shop license keys, while a tweet in <a href=\"https:\/\/twitter.com\/dave_daves\/status\/1094880431181389824\/photo\/4\">2019<\/a> observed a phishing kit panel hosted in Unified Layer. In that Twitter post, the hosting server <i>68[.]183[.]236[.]100<\/i> was also reported to have a DigitalOcean ASN.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"53.025215252153\">\n<div readability=\"52.538745387454\">\n<p><span class=\"body-subhead-title\">16shop operations and investigation<\/span><\/p>\n<p>The business and construction operation of the phishing kit is nicely explained in a <a href=\"https:\/\/www.youtube.com\/watch?v=Sd5NFVc9Wzs\">2021 RSA talk<\/a> (16shop as a case study is discussed at the 11:50 in the video). The lifecycle of operating a phishing campaign is divided into different phases, similar to the modus operandi of business email compromise (BEC) schemes such as <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/f\/trend-micro-partners-with-interpol-and-nigeria-efcc-for-operatio.html\">Operation Killer Bee<\/a>.<\/p>\n<p>BEC operations fetch logs from notorious stealer malware, email extractors, or scrapers for potential target companies as the nature of BEC is focused on enterprises. Compared with phishing kit operators and sellers, the seller identifies personally identifiable information (PII) like email addresses to run a spam campaign on individuals or consumer-based sectors. Once the operator finds an effective phishing kit, the operator buys it and prepares for the kit\u2019s infrastructure such as domains and servers. They also buy HTML and letter templates for the targeted brand\/s and theme of the phishing scheme.<\/p>\n<p>The operators deploy the kit to a virtual private server (VPS), installs the PHP into the web server, and copies the kit. This allows them to monitor the number of victims, locations, and general statistics of their campaign. Next, they build the payload for the mass mailing of phishing emails, along with the letter template, HTML pages, and even shortlink-based sites for SMS. In cases like malware stealer <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/j\/autoit-compiled-negasteal-agent-tesla-ave-maria-delivered-via-malspam.html\">AgentTesla<\/a>, the operators use an automated email-sending software like <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/j\/analyzing-email-services-abused-for-business-email-compromise.html\">Gammadayne<\/a> and purchase an SMTP server, or sometimes abuse a stolen SMTP server, and run the spam campaign.<\/p>\n<p>When the phishing campaign is initiated, victims are redirected to spoofed pages, which uses fake forms to lure them into providing their PII. The last phase of the operation involves collecting the stolen PII in the form of email, log files, or even from chat apps like Telegram via API. The cybercriminals will be able to use the stolen PII, especially credit card information, or sell this to <a href=\"https:\/\/www.zdnet.com\/article\/fbi-interpol-disrupt-jokers-stash-the-internets-largest-carding-marketplace\/\">carding shops<\/a> to earn profit.<\/p>\n<p>All the processes require payment in the form of cryptocurrencies or, sometimes, cash. The overall ecosystem of a phishing campaign is made up of and dependent on:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">The operator that buys phishing kits and infrastructure<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The developer and builder of the phishing source code<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The infrastructure broker that advertises the VPS, email and hardware for operators<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The illicit market that advertises buying and selling of their services<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div readability=\"49.140163562017\">\n<div readability=\"43.68014538846\">\n<p><b>Domains\u2019 timeline<\/b><\/p>\n<p>The domains were created in the following years:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><\/span>2017: 16digit.shop<\/li>\n<\/ul>\n<p>RNS says in an interview that 16shop phishing kit was started and developed with a colleague.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><\/span>2018: 16shop.online<\/li>\n<\/ul>\n<p>In 2018, <i>16digit.shop<\/i> was replaced by <i>16shop.online<\/i>, which may indicate that it is operated by the main admin owner. Although there is no registrant email address and name, the registrant\u2019s location was <a href=\"https:\/\/twitter.com\/dave_daves\/status\/1068456168954175489\/photo\/4\">identified<\/a> to be in Indonesia.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><\/span>2019: 16shop.us<\/li>\n<\/ul>\n<p>The domain <i>16shop[.]us<\/i> became active in 2019 and was hosted on server <i>89[.]203[.]249[.]185<\/i>. This is the same host server with <i>16digit[.]shop<\/i>, the first domain of the administrator\u2019s initials \u201cRNS.\u201d Interestingly, a phishing domain, <i>appleidnotice[.]apphelpa[.]cc<\/i>, was resolved to this IP address in 2017, which might indicate the early phishing development of the admin RNS.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><\/span>2020: 16shop.co<\/li>\n<\/ul>\n<p>The <i>16shop.co<\/i> domain was hosted on the same server of <i>16shop.us<\/i>, which is <i>68[.]183[.]178[.]69<\/i>&nbsp; and identified to be hosted by Digital Ocean. The certificate domain of <i>16shop.us<\/i> was <i>16shop.co<\/i>, which indicates that it was being used by the same admin panel owner. The <i>16shop.co<\/i> domain resolved to another IP address: <i>128[.]199[.]252[.]82, <\/i>registered to Digital Ocean. Pivoting from this IP address led to two more 16shop domains: <i>16shop.vip<\/i>, which is the reported domain for Cash App as another target brand. The other domain is an unusually formatted domain: &nbsp;<i>16shop.lx-coding.in<\/i>.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><\/span>2021: 16shop.vip<\/li>\n<\/ul>\n<p>The domain <i>16shop.vip<\/i> was used as a subject alternative name in the SSL certificate of <i>16shop.lx-coding.in<\/i>. Following the domain <i>lx-coding.in<\/i> led us to a GitHub account with the handle \u201clxcoding666\u201d pinned. This then led to another threat actor with the initials \u201cL J,\u201d where we found an Instagram account (previously having same profile photo with the GitHub account but was recently changed to a photographer\u2019s profile. A <a href=\"https:\/\/banjarmasin.apahabar.com\/post\/wow-alat-peretas-buatan-pemuda-amuntai-pernah-serang-apple-paypal-dan-amazon-l7cnjvyd\">report<\/a> featuring \u201cRNS\u201d said he no longer develops 16shop and instead focused on photography). \u201cL J\u201d speaks Indonesian and has several underground accounts, including a blog about being a Java bounty hunter, participation in a credit card hacking forum, and a discussion on topics like stolen PayPal accounts.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"40.254710632571\">\n<div readability=\"25.842530282638\">\n<p>Other domains, like <i>16shop.club<\/i> and <i>16shop.online<\/i> that considered the early versions of the 16shop admin panel, were seen active in 2019. The domains <i>16digit.shop<\/i> and <i>16shop.us<\/i> were registered by <i>root.devilscream@gmail[.]com<\/i> with the registrant\u2019s <a href=\"https:\/\/cyberthreat.id\/read\/10674\/EXCLUSIVE-Pengakuan-Riswanda-Hacker-Indonesia-Pembuat-Alat-Peretas-16Shop-yang-Gegerkan-Peneliti-Keamanan-Siber-Dunia\">full name<\/a> mentioned in the RIF Name Service (RNS). Security analysts initially dubbed the threat actor as \u201cDevilScream,\u201d who was found to have a history of writing exploit codes and defacing several websites.<\/p>\n<p>The investigation on the main developer or admin of 16shop was identified because of the threat actor\u2019s poor operational security. In 2021, he contacted <i>Cyberthreat.id<\/i> and initiated an interview to address his involvement with the report of 16shop that targeted Cash App. He mentioned in the interview that since 2019, that he was no longer involved in developing the phishing kit. However, the <i>16shop.vip<\/i> domain that hosted the additional target brand Cash App was active around April 2021. This domain appeared active as a 16shop admin panel and was registered in 2021 with an alternative registrant email address, phone number, and name. Using the Open Source Intelligence (OSINT) tool Social Links, the phone was connected to another email address, and we found that both emails were registered in an e-commerce company based in Indonesia in 2018 and 2019. Both emails also under the name of \u201cRNS,\u201d and one of the emails \u2014 along with the phone number \u2014 is available for reference with Indonesian Court records.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"34.095563139932\">\n<div readability=\"16.100682593857\">\n<p>Aside from 16shop, we also investigated phishing kits tracked to be based in Indonesia, and some are listed in the table below, as <a href=\"https:\/\/twitter.com\/JCyberSec_\/status\/1185469978537054208\">reported<\/a> by security researcher <a href=\"https:\/\/twitter.com\/JCyberSec_\">JcyberSec_<\/a>. In 2021, we also investigated the possible actor and phishing server of an Office365 <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/a\/fake-office-365-used-for-phishing-attacks-on-c-suite-targets.html\">scam page kit<\/a>, a phishing campaign that targeted high ranking company executives since 2019 and reused the compromised accounts to target more. We included these kits to highlight how 16shop was widely used and reused, becoming the most used phishing kit among cybercriminals, and most analyzed among security researchers.&nbsp;&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"31\">\n<div readability=\"7\">\n<p><span class=\"body-subhead-title\">Cooperation with Interpol<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"49.987621753247\">\n<div readability=\"45.533279220779\">\n<p>Local law enforcement agencies in <a href=\"https:\/\/www.asahi.com\/articles\/ASR884RWLR87UTIL040.html\">Japan<\/a> and <a href=\"https:\/\/humas.polri.go.id\/2023\/08\/08\/bareskrim-ungkap-peretasan-kartu-kredit-di-jepang-kerugian-capai-16-milyar\/\">Indonesia<\/a> have conducted their respective interviews and investigations on the arrested facilitators of 16shop on how they profited in millions from the stolen credit card information. Due to the financial impact of 16shop to the financial sector and consumers, Interpol spearheaded an investigation. In 2020, we received a request for information and have been actively investigating these phishing campaigns since with the agency, gathering intelligence on the threat actors involved. We gauged the impact of this phishing campaign heavily targeting and affecting Japan, the US, and Germany. In 2022, Indonesian police <a href=\"https:\/\/cyberthreat.id\/read\/13600\/Polisi-FBI-dan-Interpol-Tangkap-Riswanda-Hacker-Indonesia-yang-Bikin-Alat-Peretas-16Shop\">apprehended<\/a> the phishing kit developer in coordination with Interpol and FBI. The aim was to apprehend the main administrator of the phishing kit and to take down the main phishing servers so 16shop\u2019s services and stop purchase transactions from its customers.<\/p>\n<p>According to the Attorney\u2019s General Office case file, the suspect was identified to develop and sell source code or scripts of 16shop phishing-as-a-service, which could hack international electronic payment accounts and credit cards. The source code features anti-bot and anti-phishing detection capabilities, supports eight languages, and would automatically load to the victim\u2019s device depending on the geolocation. This phishing campaign aimed to fetch sensitive or personal data from account owners such as credit card numbers, usernames, passwords, ID cards, telephone numbers, and other supporting data. The perpetrator also targeted more than 70,000 accounts of multiple international companies across 43 countries, and the amount of loss is estimated to be around Rp. 127 billion (US$8 million).<\/p>\n<p>Whilst 16shop was still operating after the main administrator was apprehended, we observed that the admin panel <i>16shop[.]vip<\/i> with registrant details still links to \u201cRNS,\u201d a.k.a. DevilScream. 16shop is currently no longer active, and local police in Indonesia and Japan conducted two more follow-up arrests from this operation with aid from Interpol.<\/p>\n<p>This outstanding partnership of Trend Micro with Interpol continues as we carry on our mission to provide a safer world in cyberspace. We were given the opportunity to help enhance the intelligence and shared information through requests and exchanging information, resulting in a collaborative and coordinated action from law enforcement agencies from different countries.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/i\/revisiting-16shop-phishing-kit-trend-interpol-partnership.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this entry, we summarize the security analyses and investigations done on phishing-as-a-service 16shop through the years. We also outline the partnership between Trend Micro and Interpol in taking down the main administrators and servers of this massive phishing campaign. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53494,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9521,9511,9508,9513,9577],"class_list":["post-53493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-malware","tag-trend-micro-research-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-01T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/revisiting-16shop-phishing-kit-trend-interpol-partnership:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership\",\"datePublished\":\"2023-09-01T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/\"},\"wordCount\":1789,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Phishing\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/\",\"name\":\"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg\",\"datePublished\":\"2023-09-01T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/revisiting-16shop-phishing-kit-trend-interpol-partnership\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/","og_locale":"en_US","og_type":"article","og_title":"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-01T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/revisiting-16shop-phishing-kit-trend-interpol-partnership:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership","datePublished":"2023-09-01T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/"},"wordCount":1789,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Malware","Trend Micro Research : Phishing"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/","url":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/","name":"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg","datePublished":"2023-09-01T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/revisiting-16shop-phishing-kit-trend-interpol-partnership.jpg","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/revisiting-16shop-phishing-kit-trend-interpol-partnership\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Revisiting 16shop Phishing Kit, Trend-Interpol Partnership"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53493"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53493\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53494"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}