Friday, April 11, 2025
HomeMalwareUkrainian Hacker Charged for Operating "Raccoon Stealer" Malware-as-a-Service

Ukrainian Hacker Charged for Operating “Raccoon Stealer” Malware-as-a-Service

Published on

SIEM as a Service

Follow Us on Google News

In an international cybercrime operation dubbed Raccoon Stealer malware-as-a-service (MaaS), the Department of Justice has charged a Ukrainian 26-year-old, Mark Sokolovsky for playing a foul role.

Raccoon Stealer is a trojan that is primarily distributed with the intention of stealing information via the MaaS model. Threat actors have the option to rent Raccoon Stealer on a subscription basis with a variety of options.

Here below we have mentioned the subscription options with their respective price tags:-

- Advertisement - Google News
  • For a week it will cost $75
  • For a month it will cost $200

There is an administrative panel available to subscribers that allows them to add filters to malware as well as do the following things:-

  • Customize the malware
  • Retrieve the stolen data
  • Create new malware builds

Threat actors get tons of malicious features to steal a wide range of data from the victims’ devices with Raccoon Stealer. Here below we have mentioned the types of data that it enables threat actors to steal:-

  • Saved browser credentials
  • Credit card number
  • Debit cards numbers
  • Cryptocurrency wallets
  • Email

Under the guise of cracked software, Raccoon Stealer is mainly distributed as a malicious program. As far as online monikers go, Sokolovsky was known by a variety of names such as:-

  • raccoonstealer
  • Photix
  • black21jack77777

Raccoon Stealer has been actively operating since April 2019, but it was unexpectedly suspended in March 2022 by the threat actors that were behind it.

In March 2022 Sokolovsky was arrested and is being detained in the Netherlands. While at the moment, he is awaiting extradition to the United States in order to face his charges.

The core infrastructure of Raccoon Infostealer was dismantled by the FBI along with other law enforcement agencies from the Netherlands and Italy.

Since June 2022, there has been a number of underground forums that have been circulating the second version of Raccoon Stealer which was written in C/C++.

A total of 50 million unique credentials and forms of identification of the victims are estimated to have been stolen by the malware based on information provided by the FBI.

Over four million email addresses are said to be included in the credentials. To help users check if their email addresses have been compromised, the FBI has developed a website that lets users check their email addresses.

Charges

Sokolovsky is charged with the following charges:-

  • Conspiracy to commit computer fraud and related activity in connection with computers
  • Conspiracy to commit wire fraud
  • Conspiracy to commit money laundering
  • Aggravated identity theft

The defendant, Mark Sokolovsky could face a maximum imprisonment sentence of 20 years if he is found guilty.

Managed DDoS Attack Protection for Applications – Download Free Guide

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network...

Microsoft Issues Urgent Patch to Fix Office Update Crash

Microsoft has released an urgent patch for Office 2016 to address a critical issue...

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against...

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the...

Malicious ‘mParivahan’ App Circulates on WhatsApp, Skimming Sensitive Mobile Data

A new variant of the fake NextGen mParivahan app has emerged, exploiting the trust...