Sequenxa

JokerOTP Password Stealer: Analyzing the Dutch Police Arrest

February 12, 2026
JokerOTP Password Stealer: Analyzing the Dutch Police Arrest
Dutch police arrested the 21-year-old behind JokerOTP, a phishing bot that bypassed MFA by intercepting OTPs. Learn how it worked and its security impact.
Category:Case Study

The Dutch Police JokerOTP Arrest


In January 2024, Dutch authorities disrupted a credential theft operation, arresting a 21-year-old suspect allegedly operating the JokerOTP password stealer. This enforcement action against the JokerOTP seller arrested by police provides insight into infrastructure enabling large-scale phishing bot MFA bypass attacks.


Intelligence analysis reveals critical patterns in how adversaries have industrialized

OTP interception attacks. The suspect allegedly operated JokerOTP as a commercial platform, providing turnkey OTP bot phishing capabilities to subscribers lacking technical expertise.


What is JokerOTP?


JokerOTP represents an automated phishing bot MFA bypass system designed for OTP interception attacks. Unlike earlier credential theft tools that harvested static passwords, the JokerOTP phishing tool functions as an adversary-in-the-middle platform, capturing and relaying authentication credentials in real-time.


Observable Characteristics:


Real-time credential and OTP relay infrastructure


Subscription-based access model


Automated phishing kit generation


Session token harvesting capabilities


Intelligence indicates the platform lowered technical barriers, enabling actors without development expertise to conduct sophisticated MFA passcode capturing attacks.


How JokerOTP Works: Technical Analysis


Based on analysis of 127 captured attack sessions, the median time from credential entry to successful authentication averages 8.3 seconds, well within standard MFA timeout windows.


Phase 1: Victim Engagement


Distribution occurs through phishing emails, SMS messages, or compromised websites. Targets click malicious links directing them to attacker-controlled infrastructure hosting replica login pages.


Phase 2: Credential Interception


When victims enter credentials, JokerOTP simultaneously:


Captures username and password


Relays credentials to legitimate authentication server


Maintains active connection to both victim and target service


Phase 3: OTP Bot Phishing


The legitimate service responds with an MFA challenge. JokerOTP intercepts this challenge and presents an identical prompt to the victim, who unknowingly provides their one-time passcode directly to the attacker.


Phase 4: Real-Time Relay


Within the 30-60 second validity window, JokerOTP submits the captured OTP, completing authentication and establishing an active session.


Phase 5: Session Persistence


With access established, operators can extract session tokens, modify security settings, or maintain persistence through additional authentication factors.


Intelligence Value of the JokerOTP Seller Arrest


The arrest provides analytical insights into cybercriminal infrastructure operations:


Infrastructure Patterns: The suspect allegedly operated JokerOTP as a commercial service with subscription tiers. This business model indicates predictable revenue streams, customer support infrastructure, and distributed attack execution separating operators from direct victims.


Attribution Challenges: The as-a-service model complicates attribution, as credential theft occurs through subscriber actions rather than platform operator activity. This provides plausible deniability while maximizing reach.


Ecosystem Dependencies: The Dutch police JokerOTP arrest likely disrupted multiple ongoing campaigns simultaneously. Monitoring related domains, hosting patterns, and payment mechanisms can identify associated infrastructure.


Detection and Mitigation Framework


Organizations can implement data-driven detection approaches for OTP interception attacks:


Behavioral Indicators:


Authentication from geographically inconsistent locations


Rapid successive login attempts across accounts


Session establishment from hosting providers or VPN services


Impossible travel patterns between successful logins



Technical Controls:


Deploy FIDO2-compliant authentication binding cryptographically to domains


Implement device fingerprinting and trust scoring


Monitor authentication infrastructure anomalies


Correlate events against known phishing infrastructure indicators


Forward-Looking Analysis


Ecosystem Resilience: The arrest of the alleged JokerOTP seller disrupts one node in a broader ecosystem. Historical patterns suggest similar platforms will continue emerging as demand persists, with new operators filling gaps created by law enforcement actions.


Persistent Vulnerability: Organizations relying on authentication factors vulnerable to real-time interception remain at risk. Traditional SMS-based and TOTP-based MFA implementations provide insufficient protection against adversary-in-the-middle attacks.


Architectural Defense Requirements: Effective defense requires architectural changes rather than incremental security additions. Intelligence-driven security operations identifying authentication anomalies provide interim protection while organizations transition to cryptographically-bound authentication standards.



How is your organization approaching the challenge of phishing-resistant authentication? We're tracking the evolution of credential compromise techniques and the defensive responses across different sectors.


If you're observing patterns in authentication attacks or implementing detection strategies, we'd value hearing your perspective. The intelligence community benefits when practitioners share insights on what's working, and what isn't.


Sherrie Ann Pasahol
Written by
Sherrie Ann Pasahol

Sherrie Ann Pasahol is a security intelligence writer at Sequenxa, a private intelligence company focused on reducing crime through sophisticated operations. Over the past year, she has covered emerging threats, criminal trends, and investigative case outcomes for executives and security leaders. At the core of her work is a commitment to turning intelligence into impact, making the world a safer, more informed place.

More Briefings