6.7 C
London
Tuesday, February 20, 2024

Hacker Arrested For Stealing Banking Credentials


A person residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential knowledge of Android customers and exploiting their Google accounts belonging to residents of the US and Canada.

The cybercrime incident resulted within the perpetrator buying a complete quantity of greater than UAH 3.5 million.

Modus Operandi of Hacker

In Vinnytsia, Ukraine, a hacker has developed a number of web sites offering free software program downloads. These downloads are sometimes pirated and probably comprise malware or viruses that compromise the safety of the consumer’s gadget.

The person initiated a complete internet advertising initiative to advertise the web sites and improve their credibility. This concerned varied technical methods aimed toward rising the trustworthiness of the web sites.

After customers obtain and set up software program free of charge, they inadvertently set up hid malware inside the applications.

The malware in query might infiltrate the units with out the consumer’s information, offering the hacker unrestricted entry to the system.

The perpetrator efficiently monetized the unauthorized entry by promoting the exfiltrated knowledge to nefarious actors on the web. The proceeds generated from the sale had been utilized to buy a Mercedes-Benz GLE automotive, reads the report.

The Investigation:

Assisted by the KORD particular drive, the legislation enforcement personnel efficiently positioned and apprehended the perpetrator.

Authorities performed three complete searches and confiscated a car price roughly 2.5 million hryvnias. We additionally obtained different essential items of proof in the course of the operation.

The accused is chargeable for a most jail time period of 8 years and seizure of property resulting from expenses of participating in cash laundering, hacking actions, and creating and circulating malicious software program.

The investigation is underway to establish the identities of any attainable accomplices concerned within the case.

Keep up to date on Cybersecurity information, Whitepapers, and Infographics. Comply with us on LinkedIn & Twitter.



Latest news
Related news

LEAVE A REPLY

Please enter your comment!
Please enter your name here