Tuesday, November 26, 2024
HomeCyber CrimeLaw Enforcement Authorities Dismantled The Hacker Groups Database That Contains Millions of...

Law Enforcement Authorities Dismantled The Hacker Groups Database That Contains Millions of Users Credentials

Published on

European Union Agency with other law enforcement agencies takes down the infamous hacking group known as InfinityBlack database that has managed to sell the complete databases with millions of users’ private credentials on the internet.

This hacking group is well known for distributing stolen credentials, as well as creating and distributing malware or several types of hacking tools.

The European Union Agency for Law Enforcement Cooperation, Europol, continues to collaborate with different national police forces and law enforcement authorities in various operations against hacking or content piracy. 

- Advertisement - SIEM as a Service

As in recent times, Europol has achieved some important achievements to end pirated IPTV (Internet Protocol television), but now they have managed to score somewhat in different areas as well, like the universe of hackers. 

Recently, several Law enforcement agencies joint operations were carried out on April 29, 2020, in Poland, and five people who were members of this hacker group were arrested.

InfinityBlack

The Polish National Police, Policja, has seized various computer equipment, external hard drives, and cryptocurrency wallets with a value of about 100,000 euros. 

InfinityBlack

Along with this, they closed two databases with more than 170 million records in the form of private credentials, obtained mainly in Switzerland. This group of hackers had even created an online sales platform to sell these private credentials on the Dark Web. 

According to the Europol report, the group was perfectly organized into three different teams, each with a specific role and function. Here are roles that each member in the hacking group, InfinityBlack plays:-

  • Some created tools to check the quality of the stolen data.
  • Some members are there who only analyze the stolen data in detail.
  • Some were in charge of selling them in packages on the internet and Dark Web.

Hackers Target the rewards point programs 

Their primary source of stolen data was correlated to the rewards point programs; In fact, they had designed a complex operation to steal thousands of accounts in Switzerland. Moreover, it is estimated that the losses caused by this hacking group, InfinityBlack, were around 50,000 euros, while the damage could have been up to 610,000 euros, as the hackers had access to more accounts. 

All these have become possible due to the joint collaboration of Polish and Swiss law enforcement authorities who were supported by Europol and Eurojust, who stopped all the illegal cyber operations of the hacking group in time.

The Police set them up with the purchase of these data, managing to relate them to users in Poland. Along with these organizations, Europol has also provided technical means and the necessary support so that everything could be concluded satisfactorily.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read:

Law enforcement and Microsoft Shutdown a Major Malware Attack by Mapping 400,000 IP’s

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Interpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce Websites With JS-Sniffer Malware

Two Massachusetts Men Arrested for Conducting SIM-swapping Attack To Steal Cryptocurrency & Social Media Login

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

DOJ Asks Google to Sell $20 Billion Worth Chrome to End Monopoly

In a dramatic escalation of its antitrust lawsuit against Google, the U.S. Department of...