Sunday, April 27, 2025
HomeCyber CrimeInterpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce...

Interpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce Websites With JS-Sniffer Malware

Published on

SIEM as a Service

Follow Us on Google News

3 Indonesia Hackers has been arrested by the Interpol under coordinated cyber operation for hacking hundreds of E-commerce websites using JS-Sniffer Malware.

ANF (27), K (35), and N (23) who have resided in Indonesia and running the malicious campaign, and targeting the E-Commerce websites with the malware known as JavaScript-sniffer.

Malware authors developed with JavaScript-sniffer to attack specifically an E-Commerce website to steals the customers’ payment card details, and personal data such as names, addresses, and phone numbers, sending the information to Command and Control (C2) servers controlled by the cybercriminals.

- Advertisement - Google News

JavaScript-sniffer initially detected in 2018, was used by the unknown cybercrime group to infect the Magento-based websites, also there was a shred of evidence collected by the Group-IB that said the attackers are used password-stealing malware and tried to infect online merchants in order to infect their websites with the JS-sniffer.

During that time, infect nearly 200 websites in Indonesia, Australia, Europe, the United States, South America, and some other countries.

These malware operators are infecting E-commerce websites from Indonesia, they were arrested with the help of the Indonesian Cyber Police and other five ASEAN countries which have shared the intelligence data to the Interpol.

Cybersecurity Firm Group-IB from Singapore has supported this investigation with digital forensics expertise helping to identify the suspects.

“The suspects have managed to infect hundreds of e-commerce websites in various locations, including in IndonesiaAustralia, the United Kingdom, the United States, Germany, Brazil, and some other countries. Payment and personal data of thousands of online shoppers from Asia, Europe, and the Americas have been stolen.”Group-IB told GBHackers on Security via Email.

Indonesian Hackers

Arrest & Secenteses

All 3 hackers were arrested in December from different regions in Indonesia and the Indonesian Cyber Police seized laptops, mobile phones of various brands, CPU units, IDs, BCA Token, ATM cards during the investigation.

Indonesian Hackers

According to the Indonesian criminal code, suspected operators of the GetBilling JavaScript-sniffer family are charged with the theft of electronic data, which carries up to a 10-year jail sentence.

INTERPOL’s Director of Cybercrime Craig Jones said, “Strong and effective partnerships between police and the cybersecurity industry are essential to ensure law enforcement worldwide has access to the information they need to address the scale and complexity of today’s cyberthreat landscape”

The investigation reveals that the malware derived the GetBilling family and, is used by these Indonesian Hackers to steal the various sensitive information and use it to buy goods, such as electronic devices or other luxury items and reselling it in the Indonesia market at a lower price.

 stolen payment and personal data stored on GetBilling’s servers

“The size of the carding market, in turn, grew by 33 percent and amounted to  USD 879.7 million. The sale of CVV data is also on the rise today, having increased by 19 percent in the corresponding period, and one of the key reasons behind this trend could be JavaScript-sniffers.” Group-IB told GBHackers.

The number of compromised cards uploaded to underground forums increased from 27.1 million to 43.8 million in H2 2108-H1 2019 year-on-year.

GBHackers learned that the authorities took down the Command and control servers used by these criminals to collect the data from the victims.

Also Read:

Two Massachusetts Men Arrested for Conducting SIM-swapping Attack To Steal Cryptocurrency & Social Media Login

18 International Hackers who Steal Tens of Millions of Dollars Arrested For ATM Skimming Attack

Operation reWired – 281 Email Scammers Arrested Worldwide for Attacking Hundreds of Business and Individuals

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean APT Hackers Pose as Companies to Spread Malware to Job Seekers

Silent Push Threat Analysts have uncovered a chilling new cyberattack campaign orchestrated by the...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...