chat
expand_more

ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time Monitoring

With live session hijacking, OTP interception, and dynamic targeting, the ByteDance Live Panel phishing-as-a-service kit gives attackers the upper hand against traditional defenses.
April 23, 2025

Phishing kits have come a long way from static templates and basic credential harvesters.

Traditionally, these kits were simple packages containing collections of fake login pages and basic scripts that attackers had to deploy and manage themselves. In recent years, however, that do-it-yourself approach has given way to phishing-as-a-service (PhaaS) platforms.

These solutions offer far more than just files to download: they provide attackers with phishing page templates, centralized dashboards, and deployment tools—all with minimal setup required.

One recently discovered example, known as ByteDance Live Panel, illustrates just how far this model has progressed. In this post, we take a closer look at how this kit operates, what capabilities it offers, and why it represents an evolution in phishing tactics.

Discovery of ByteDance Live Panel

In late March 2025, researchers at Abnormal AI observed ByteDance Live Panel being advertised on a popular cybercriminal forum. Its developers position the kit as an easy way for would-be attackers to deploy unlimited phishing pages from a central dashboard. It was even marketed with a free trial for members of a notorious carding forum—an unusual tactic likely aimed at attracting a wide user base among fraudsters.

Byte Dance Live Panel Blog 1 Forum Ad

From one web-based interface, an attacker can spin up fake login pages or payment forms for different brands, monitor targets in real time, and harvest a treasure trove of sensitive data.

This centralized control panel puts a remarkable amount of power at an attacker’s fingertips. It’s a one-stop control center that a single fraudster (or a team) can use to launch what essentially amounts to a full-scale phishing operation with multiple campaigns running simultaneously.

What sets this PhaaS kit apart is its real-time feedback loop that allows attackers to observe target activity as it happens and adjust their tactics in the moment. This live interaction is also what gives the kit its name. ByteDance Live Panel blurs the line between traditional phishing pages and fully interactive scam sessions, marking a significant step forward in the evolution of phishing-as-a-service.

The Architecture of a Phishing-as-a-Service Platform

Once our team looked beyond the forum post and into the ByteDance Panel itself, we found a remarkably feature-rich toolkit. This isn’t a simple phishing kit; it is, in effect, an entire platform for interactive, targeted phishing.

Below, we break down the most important technical capabilities of this kit to show how it enables more convincing, scalable, and harder-to-detect attacks.

1. Live Session Monitoring

One of the kit’s most powerful capabilities is its support for real-time session monitoring. As soon as a user lands on a phishing page and begins entering information, their inputs can be viewed live on the attacker’s dashboard.

Byte Dance Live Panel Blog 2 Real Time Monitoring

This allows the threat actor to capture credentials, payment details, and other sensitive data the moment they are entered—and even follow the target’s activity as they move through different stages of the attack flow, such as progressing from a login page to a one-time password (OTP) prompt.

2. OTP and 3D Secure Interception

ByteDance Live Panel is designed to bypass two-factor authentication and payment verification mechanisms, including 3D Secure (3DS). It can intercept OTPs sent to the user, such as those delivered via text message for bank logins or online purchases requiring 3DS verification.

Byte Dance Live Panel Blog 3 Verification Prompts

The phishing pages mimic legitimate verification prompts, tricking users into providing their codes. By capturing the 3DS code in real time, the attacker can silently complete fraudulent transactions or logins that would otherwise require confirmation from the target’s device.

3. Credit Card Collection

The kit doesn’t stop at harvesting usernames and passwords; it also captures complete payment card details, including the card number, expiration date, and CVV. But then it goes even further, collecting any secondary information needed to bypass fraud detection systems.

Byte Dance Live Panel Blog 4 Credit Card Collection

For example, if a phishing page is disguised as a payment form, the panel will not only save the card details but also prompt the user for any additional verification data, such as an OTP or answers to security questions.

4. Domain Spoofing and SSL Abuse

The operators behind ByteDance Live Panel understand that a convincing phishing page is key to a successful attack. The kit supports custom domain integration, allowing attackers to register look-alike domain names for their phishing pages—for example, my-upps-secure[.]com instead of ups[.]com—to deceive targets.

Byte Dance Live Panel Blog 5 Domain Spoofing

It also includes built-in SSL certificate support, enabling every phishing page to display the HTTPS padlock icon. By automating certificate issuance—likely through services like Let’s Encrypt—the kit ensures even novice attackers can easily turn on encryption, making their fake sites appear more legitimate and avoiding browser “not secure” warnings.

5. BIN-Based Targeting

One especially interesting advertised feature is BIN targeting. The Bank Identification Number (BIN) is the first six to eight digits of a credit card number and identifies the issuing bank and card type. The ByteDance Live Panel likely uses BIN targeting to customize the phishing experience to each user.

Byte Dance Live Panel Blog 6 BIN Based Targeting

If the BIN corresponds to a specific bank or region, the kit can display that bank’s branding or route the target through a particular phishing flow. For example, an attacker can serve a Bank of America-style 3DS page to a BoA cardholder. This level of personalization helps make the scam appear more legitimate, increasing trust and lowering suspicion.

6. Pre-Built Branded Phishing Page Templates

ByteDance Live Panel also comes pre-loaded with templates impersonating a variety of well-known companies and services. We observed references to pages mimicking UPS, PayPal, DHL, Interac, and Shopify, among others. These ready-made templates allow attackers to quickly launch a range of phishing scenarios. Examples include:

  1. Package Delivery Scams: Fake UPS or DHL pages that ask the target to pay a small “delivery fee” or verify their address, enabling the collection of credit card details and login credentials.
  2. Payment Service Login Theft: Bogus PayPal login screens that capture usernames and passwords, which the attacker can then use or sell.
  3. Ecommerce and Banking: Phony Shopify store login pages or fake Interac money transfer sites that deceive users into entering banking credentials or email account passwords.
Byte Dance Live Panel Blog 7 Branded Phishing Pages

By providing a library of brand-specific phishing pages, ByteDance Live Panel makes it easy for attackers to tailor their lures to different targets without designing a page from scratch. An attacker could switch from a postal-service scam one day to a PayPal credential phish the next—all within the same toolkit.

Get Protection with Abnormal AI

ByteDance Live Panel exemplifies the next generation of phishing-as-a-service, combining real-time interactivity, dynamic targeting, and built-in tools that make even advanced attacks easy to execute.

Traditional security solutions that rely on static indicators or known malicious domains are ill-equipped to detect these adaptive, fast-moving campaigns. Defending against threats like ByteDance requires an AI-native approach—one that understands user behavior, detects subtle anomalies, and stops evolving attacks before they reach the inbox.

See for yourself how Abnormal AI provides comprehensive email protection against attacks that exploit human behavior. Schedule a demo today.

Schedule a Demo
ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time Monitoring

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B FBI IC3 2024 Report Blog
The 2024 FBI IC3 Report confirms BEC remains a top cyber threat, driving billions in losses alongside crypto-enabled investment scams.
Read More
B Byte Dance Live Panel Blog
With live session hijacking, OTP interception, and dynamic targeting, the ByteDance Live Panel phishing-as-a-service kit gives attackers the upper hand against traditional defenses.
Read More
B MKT849 Open graphs for Fed Ramp Authorization news Blog
Discover what Abnormal AI’s FedRAMP Moderate Authorization means for the public sector.
Read More
B 1500x1500 Open Graph Images AI Innovation Blog
Learn how Abnormal leverages the latest AI developer tools to slash engineering time and streamline internal operations.
Read More
B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More