United KingdomBusinessSuspected Data Breach Extortion Hacker Busted in Thailand

Suspected Data Breach Extortion Hacker Busted in Thailand

-

- Advertisment -spot_img


Cybercrime
,.
Fraud Management & Cybercrime

Man Accused of Hacking 90 Organizations Globally Under a Variety of Aliases

Suspected Data Breach Extortion Hacker Busted in Thailand
Royal Thai Police arrested a man accused of perpetrating over 90 data breaches. (Image: Shutterstock)

Thai police arrested a suspected hacker extortionist tied to more than 90 global data breaches.

See Also: Top 10 Technical Predictions for 2025

.

.

The suspect, that has truly not been known as, is implicated of finishing up 65 info violations within the Asia-Pacific space alone. The Royal Thai Police labored along with the Singapore Police Force to acknowledge and restrain the 39-year-old male on Wednesday.

.

.

“The threat actor is suspected to have exploited vulnerabilities in the victims’ networks before stealing the victims’ data,” theSingapore Police Force acknowledged in a declaration dispersed tolocal press “The threat actor is also suspected to have published the stolen data for sale online when victims failed to pay the ransom demanded.”

.

Police acknowledged they took laptop computer computer systems, cellphones, deluxe merchandise and vehicles price larger than $300,000.

.

.

The suspicious run beneath a variety of on-line characters, consisting of “Altdos,” which concentrated onSoutheast Asia Other pen names consisted of “Desorden,” “Ghostr” and “0mid16B,” and have been related to strikes around the globe.

.

.

Singapore -based cybersecurity firm Group- IB, which helped the examination, described the suspect as being “one of the most active cybercriminals in the Asia-Pacific since 2021, selling more than 13 terabytes of personal data on the dark web.”

.

.

Group- IB acknowledged the suspect’s selection to rework pen names was an evident effort to make his initiatives tougher to map. The firm acknowledged it assisted authorities hyperlink the totally different pen names to the solitary suspect by “linking his activities through writing styles, posting patterns and account timelines despite bans for scamming and multi-accounting.”

.

.(* ), the suspicious apparently focused on focusing on

As Altdos corporations previous to broadening the emphasis to Thai, Singapore and numerous different Bangladesh-Asia nations. Pacific authorities acknowledged the opponent often likewise made use of dispersed denial-of-service strikes versus victims The Singapore

.

.(* ), the opponent is presumed of putting a major “to disrupt operational services and to remind them to pay the ransom.”

resort chain, further targets in

As Desorden, along with Thai procedures in Singapore andAcer’s Taiwan opponent routinely printed examples of taken info on the RaidForums cybercrime on-line discussion board to promote strikes and stress victims proper into paying.India

.

.The 12 months, an aggressor using the pen names GhostR declared on the cybercrime on-line discussion board

Online boards to have truly taken larger than 34 gigabytes of knowledge coming from

Last- primarily based telecommunications enterprise Breach PTE and 846 gigabytes of knowledge from Singapore logistics businessAbsolute Telecom Australian opponent likewise declared to have truly taken 5.3 million paperwork from a major Victorian Freight Specialists testing knowledge supply saved by the The together with data on terrorists, potential unhealthy guys and dangerous individuals.British

.London Stock Exchange Group opponent usually acquired distant accessibility to methods utilizing SQL shot strikes, using such units as sqlmap, along with by focusing on badly protected distant desktop laptop process net servers,

– IB acknowledged.

The

.

.Group opponent usually

some cases, the opponent likewise secured knowledge sources to incorporate stress on victims to pay.

The

.

. “deployed a cracked version of Cobalt Strike to control compromised servers, exfiltrated data to rented cloud servers for blackmail, and leveraged direct customer notifications, media leaks and regulatory reports to pressure victims.” In acknowledged

, CHIEF EXECUTIVE OFFICER of

“This case highlights the evolution of cybercriminal tactics, not just through technical exploits but through coercion, intimidation and reputational threats,” – IB.
Dmitry Volkov.





Source link

Latest news

Hrithik pens real be aware for ex-wife Sussanne: ‘I have in mind 20 years in the past … ‘

Hrithik Roshan and Sussanne Khan break up strategies 2014, but ever since, they've really been reasonably buddies...

Bryan Kohberger occasion: Audio of 911 phone name launched in Idaho pupil murders

Join Fox News for accessibility to this net content material Plus distinctive accessibility to select write-ups and numerous different...

Injured Neymar out of Brazil World Cup qualifiers

Brazil superstar Neymar obtained on Friday eradicated of upcoming 2026 World Cup qualifiers versus Colombia and Argentina after...

New Intel CHIEF EXECUTIVE OFFICER Lip-Bu Tan to acquire $69 million settlement plan

Intel designates Lip-Bu Tan as chief government officer. Courtesy: Intel New Intel CHIEF EXECUTIVE OFFICER Lip-Bu Tan will definitely receive...
- Advertisement -spot_imgspot_img

Crew launch to ISS leads means for ‘stranded’ astronauts’ return

Not lengthy to go at the moment: After larger than 9 months on the International Space Station, 2...

Canada reevaluating F-35 acquisition in the course of stress with Washington, states preacher

Canada is proactively looking at potential choices to the U.S.-built F-35 stealth boxer and will definitely maintain discussions...

Must read

- Advertisement -spot_imgspot_img

You might also likeRELATED
Recommended to you