Monday, April 28, 2025
HomeCyber CrimeLaw Enforcement Authorities Dismantled The Hacker Groups Database That Contains Millions of...

Law Enforcement Authorities Dismantled The Hacker Groups Database That Contains Millions of Users Credentials

Published on

SIEM as a Service

Follow Us on Google News

European Union Agency with other law enforcement agencies takes down the infamous hacking group known as InfinityBlack database that has managed to sell the complete databases with millions of users’ private credentials on the internet.

This hacking group is well known for distributing stolen credentials, as well as creating and distributing malware or several types of hacking tools.

The European Union Agency for Law Enforcement Cooperation, Europol, continues to collaborate with different national police forces and law enforcement authorities in various operations against hacking or content piracy. 

- Advertisement - Google News

As in recent times, Europol has achieved some important achievements to end pirated IPTV (Internet Protocol television), but now they have managed to score somewhat in different areas as well, like the universe of hackers. 

Recently, several Law enforcement agencies joint operations were carried out on April 29, 2020, in Poland, and five people who were members of this hacker group were arrested.

InfinityBlack

The Polish National Police, Policja, has seized various computer equipment, external hard drives, and cryptocurrency wallets with a value of about 100,000 euros. 

InfinityBlack

Along with this, they closed two databases with more than 170 million records in the form of private credentials, obtained mainly in Switzerland. This group of hackers had even created an online sales platform to sell these private credentials on the Dark Web. 

According to the Europol report, the group was perfectly organized into three different teams, each with a specific role and function. Here are roles that each member in the hacking group, InfinityBlack plays:-

  • Some created tools to check the quality of the stolen data.
  • Some members are there who only analyze the stolen data in detail.
  • Some were in charge of selling them in packages on the internet and Dark Web.

Hackers Target the rewards point programs 

Their primary source of stolen data was correlated to the rewards point programs; In fact, they had designed a complex operation to steal thousands of accounts in Switzerland. Moreover, it is estimated that the losses caused by this hacking group, InfinityBlack, were around 50,000 euros, while the damage could have been up to 610,000 euros, as the hackers had access to more accounts. 

All these have become possible due to the joint collaboration of Polish and Swiss law enforcement authorities who were supported by Europol and Eurojust, who stopped all the illegal cyber operations of the hacking group in time.

The Police set them up with the purchase of these data, managing to relate them to users in Poland. Along with these organizations, Europol has also provided technical means and the necessary support so that everything could be concluded satisfactorily.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

Law enforcement and Microsoft Shutdown a Major Malware Attack by Mapping 400,000 IP’s

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Interpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce Websites With JS-Sniffer Malware

Two Massachusetts Men Arrested for Conducting SIM-swapping Attack To Steal Cryptocurrency & Social Media Login

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

Defending Against Web API Exploitation With Modern Detection Strategies

In today's interconnected digital landscape, APIs serve as the critical building blocks of modern...

Authorities Shut Down Four Encrypted Platforms Used by Cybercriminals

Law enforcement authorities across Europe and Türkiye have dealt a major blow to four...