Key Takeaways:
- U.S. authorities seized 145 domains and crypto tied to BidenCash, a dark web market trafficking in stolen credit card data and personal information.
- BidenCash, active since 2022, facilitated over 15 million stolen payment card transactions, generating more than $17 million.
- This operation is part of a broader crackdown on dark web crime, following May’s Operation RapTor and other global enforcement efforts.
U.S. authorities have seized 145 domains and an undisclosed amount of cryptocurrency linked to BidenCash, a dark web marketplace accused of selling millions of stolen credit cards and personal data.
Announced on June 5 by the U.S. Attorney’s Office for the Eastern District of Virginia, the operation followed a court-authorized effort targeting the platform’s infrastructure and assets.
U.S. Government seizes approximately 145 criminal marketplace domains https://t.co/h8l7tCkn4r
— U.S. Attorney EDVA (@EDVAnews) June 4, 2025
The seized domains now redirect to law enforcement servers.
Launched in March 2022, BidenCash attracted over 117,000 users and facilitated the sale of more than 15 million stolen payment card records, generating over $17 million in revenue.
The platform also sold unauthorized access credentials to computer systems.
In a marketing push, BidenCash gave away 3.3 million stolen credit card records between October 2022 and February 2023.
The U.S. Secret Service, FBI, and other cybercrime units led the investigation as part of a broader effort to dismantle illicit networks using cryptocurrency.
This move follows earlier actions like May’s Operation RapTor, which resulted in 270 arrests and the seizure of $200 million, largely in crypto, from dark web drug markets.