Thursday, February 27, 2025
HomeCyber Security NewsAuthorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest of a prolific hacker linked to over 90 major data breaches across 25 countries, including 65 attacks in the Asia-Pacific region.

The cybercriminal, operating under aliases ALTDOS, DESORDEN, GHOSTR, and 0mid16B, exfiltrated 13 terabytes of sensitive data between 2020 and 2025, targeting industries from healthcare to government agencies.

The arrest marks a critical victory in global efforts to combat dark web crime syndicates and protect digital infrastructure.

The Operation and Arrest

The joint investigation, spearheaded by Group-IB’s Digital Crime Resistance Centers (DCRCs) in Thailand and Singapore, culminated in a raid on the hacker’s Thailand-based hideout.

Authorities seized laptops, electronic devices, and luxury goods purchased with illicit profits from dark web data sales.

Forum Banned
Forum Banned

The Royal Thai Police confirmed the individual’s involvement in attacks on multinational corporations, small businesses, and even government databases, with victims spanning Thailand, India, Indonesia, the UK, and the United States.

The Royal Thai Police raiding the cybercriminal’s premises.
The Royal Thai Police raiding the cybercriminal’s premises.
Authorities seized laptops, electronic devices, and luxury goods purchased with illicit profits
Authorities seized laptops, electronic devices, and luxury goods purchased with illicit profits

Initially active under the alias ALTDOS in 2020, the hacker focused on Thai entities, employing SQL injection tools like sqlmap and exploiting insecure Remote Desktop Protocol (RDP) servers to infiltrate networks.

Unlike typical ransomware actors, he prioritized data theft over encryption, threatening victims with public exposure via media outlets or data regulators unless paid.

For example, in 2022, he leaked 8 million customer records from a Thai e-commerce platform after the company refused extortion demands, causing severe reputational damage.

By 2023, rebranding as DESORDEN, he expanded operations across Asia-Pacific, targeting healthcare providers and financial institutions.

Group-IB’s analysts noted his shift to CobaltStrike beacon deployments for persistent access, though lateral movement within networks was minimal.

This phase saw the theft of 9.5 million patient records from a regional hospital chain, later sold on forums like BreachForums for cryptocurrency.

Global Escalation and Detection Evasion

The cybercriminal’s tactics grew bolder under the GHOSTR and 0mid16B aliases in 2024, with attacks on Western entities, including a UK logistics firm and a Canadian insurance provider.

To evade detection, he frequently altered personas, communication channels, and data-sharing platforms. Group-IB’s AI-driven dark web monitoring linked the aliases through linguistic patterns, posting formats, and victim geography.

For instance, a preference for Telegram channels and consistent misspellings in leaked files helped analysts correlate attacks across time zones.

The hacker’s breaches compromised sensitive data for over 40 million individuals, including national ID numbers, medical histories, and financial records.

 In one case, a Middle Eastern government agency lost 2.7 terabytes of citizen data, triggering nationwide identity theft concerns.

Legal experts predict severe penalties under Thailand’s Computer Crimes Act and Singapore’s Cybersecurity Act, which allow for up to 20 years imprisonment for aggravated offenses.

This case underscores the importance of public-private partnerships in tackling cybercrime.

As Group-IB’s CEO, Dmitry Volkov, stated, “The arrest demonstrates that even the most elusive threat actors can be unmasked through persistent intelligence-sharing and technological innovation.”

Moving forward, INTERPOL plans to leverage the operation’s insights to enhance global dark web surveillance protocols, aiming to preempt similar large-scale campaigns.

Authorities urge organizations to patch RDP vulnerabilities, audit third-party access, and adopt threat-hunting tools to mitigate risks.

For victims, the takedown offers a semblance of justice—and a stark reminder of digital vulnerabilities in an interconnected world.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...