Friday, February 28, 2025
spot_imgspot_img

Top 5 This Week

spot_img

Related Posts

Suspected Data Breach Extortion Hacker Busted in Thailand


Cybercrime
,.
Fraud Management & Cybercrime

Man Accused of Hacking 90 Organizations Globally Under a Variety of Aliases

Suspected Data Breach Extortion Hacker Busted in Thailand
Royal Thai Police arrested a man accused of perpetrating over 90 data breaches. (Image: Shutterstock)

Thai police arrested a suspected hacker extortionist tied to more than 90 global data breaches.

See Also: Top 10 Technical Predictions for 2025

.

.

The suspect, that has really not been known as, is implicated of finishing up 65 data violations within the Asia-Pacific space alone. The Royal Thai Police labored along with the Singapore Police Force to acknowledge and restrain the 39-year-old male on Wednesday.

.

.

“The threat actor is suspected to have exploited vulnerabilities in the victims’ networks before stealing the victims’ data,” theSingapore Police Force said in a declaration dispersed tolocal press “The threat actor is also suspected to have published the stolen data for sale online when victims failed to pay the ransom demanded.”

.

Police said they took laptop computer computer systems, cellphones, deluxe merchandise and vehicles value higher than $300,000.

.

.

The suspicious run beneath a spread of on-line characters, consisting of “Altdos,” which concentrated onSoutheast Asia Other pen names consisted of “Desorden,” “Ghostr” and “0mid16B,” and have been related to strikes all over the world.

.

.

Singapore -based cybersecurity firm Group- IB, which helped the examination, described the suspect as being “one of the most active cybercriminals in the Asia-Pacific since 2021, selling more than 13 terabytes of personal data on the dark web.”

.

.

Group- IB said the suspect’s selection to rework pen names was an evident effort to make his initiatives tougher to map. The firm said it assisted authorities hyperlink the totally different pen names to the solitary suspect by “linking his activities through writing styles, posting patterns and account timelines despite bans for scamming and multi-accounting.”

.

.(* ), the suspicious apparently targeting focusing on

As Altdos firms previous to broadening the emphasis to Thai, Singapore and numerous different Bangladesh-Asia nations. Pacific authorities said the opponent sometimes likewise made use of dispersed denial-of-service strikes versus victims The Singapore

.

.(* ), the opponent is presumed of hanging a big “to disrupt operational services and to remind them to pay the ransom.”

resort chain, extra targets in

As Desorden, along with Thai procedures in Singapore andAcer’s Taiwan opponent routinely revealed examples of taken data on the RaidForums cybercrime on-line discussion board to promote strikes and stress victims proper into paying.India

.

.The yr, an aggressor using the pen names GhostR declared on the cybercrime on-line discussion board

Online boards to have really taken higher than 34 gigabytes of data coming from

Last- based mostly telecommunications enterprise Breach PTE and 846 gigabytes of data from Singapore logistics businessAbsolute Telecom Australian opponent likewise declared to have really taken 5.3 million paperwork from a big Victorian Freight Specialists testing knowledge supply stored by the The together with information on terrorists, doable dangerous guys and dangerous folks.British

.London Stock Exchange Group opponent usually acquired distant accessibility to techniques utilizing SQL shot strikes, using such gadgets as sqlmap, along with by focusing on badly protected distant desktop pc process net servers,

– IB said.

The

.

.Group opponent usually

some situations, the opponent likewise secured knowledge sources to incorporate stress on victims to pay.

The

.

. “deployed a cracked version of Cobalt Strike to control compromised servers, exfiltrated data to rented cloud servers for blackmail, and leveraged direct customer notifications, media leaks and regulatory reports to pressure victims.” In said

, CHIEF EXECUTIVE OFFICER of

“This case highlights the evolution of cybercriminal tactics, not just through technical exploits but through coercion, intimidation and reputational threats,” – IB.
Dmitry Volkov.





Source link

Popular Articles