Federal authorities dismantled one of the most prolific darknet marketplaces for stolen financial data this week, seizing 145 domains linked to BidenCash and disrupting its global cybercrime operations.
The U.S. Attorney’s Office for the Eastern District of Virginia revealed the marketplace facilitated over $17 million in illicit revenue by trafficking 15 million compromised payment cards and personal records before its infrastructure was redirected to law enforcement servers.
The U.S. Secret Service and FBI, in collaboration with international partners, executed a coordinated seizure of BidenCash’s digital infrastructure on June 5, 2025.
The operation neutralized 145 domains operating on both the darknet and conventional internet, which hosted platforms enabling anonymous transactions of stolen credit card details, CVV codes, and personally identifiable information (PII).
Forensic analysis confirmed the marketplace employed cryptocurrency-based payment rails to process over 117,000 registered users, charging commissions on each transaction.
Court-authorized seizures extended to cryptocurrency wallets containing proceeds from BidenCash’s operations, crippling its financial backbone.
The domains now redirect visitors to a server controlled by U.S. law enforcement, displaying a seizure notice and warning against further criminal activity.
U.S. Attorney Erik S. Siebert emphasized the action “prevents future harm to victims by dismantling the ecosystem enabling bulk fraud”.
Dark Web Marketplaces
Launched in March 2022, BidenCash rapidly evolved into a full-service hub for cybercriminals. Its administrators curated a catalog of 15 million payment card records, including card numbers, expiration dates, CVVs, and linked PII such as addresses and phone numbers.
To attract users, the platform released 3.3 million stolen credit card files for free between October 2022 and February 2023—a tactic analysts describe as a “loss leader” strategy to build credibility.
The marketplace’s user-friendly interface allowed buyers to filter stolen data by card type, geographic region, and financial institution, streamlining large-scale fraud operations.
Investigators estimate the platform generated $17 million in revenue, with illicit funds laundered through privacy-focused cryptocurrencies.
Cybersecurity firm Searchlight Cyber noted BidenCash’s advertisements on underground forums highlighted its “24/7 customer support” and “guaranteed valid data,” accelerating its adoption among threat actors.
Cybercrime Investigation
According to Report, the three-year investigation united the U.S. Secret Service’s Cyber Investigative Section, FBI Albuquerque Field Office, and Dutch National High Tech Crime Unit, leveraging cross-border intelligence sharing to map BidenCash’s infrastructure.
The Shadowserver Foundation provided critical technical analysis of darknet traffic patterns, identifying server clusters disguised behind blockchain-based hosting services.
“This operation underscores the necessity of public-private partnerships in combating cybercrime,” stated Philip Russell, Acting FBI Special Agent in Charge.
Analysis of seized cryptocurrency transactions revealed payments to developers in Eastern Europe and Southeast Asia, though no arrests have been disclosed.
Assistant U.S. Attorney Zoe Bedell confirmed the investigation remains active, with further indictments anticipated as forensic audits progress.
The takedown marks a significant blow to darknet-based financial fraud, yet experts warn successor platforms often emerge within months.
The Department of Justice has launched an outreach program to financial institutions impacted by BidenCash, urging enhanced monitoring of compromised card numbers.
As cybercriminals adapt, authorities emphasize ongoing vigilance in securing payment ecosystems against evolving darknet threats.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update