Thursday, March 20, 2025
HomeCyber Security NewsAuthorities Arrested Hacker Who Compromised 40+ Organizations

Authorities Arrested Hacker Who Compromised 40+ Organizations

Published on

SIEM as a Service

Follow Us on Google News

Spanish authorities have arrested a hacker believed to be responsible for cyberattacks targeting over 40 public and private organizations globally.

The suspect, apprehended on Tuesday in Calpe (Alicante), allegedly compromised sensitive data and disrupted critical services, including government agencies, international institutions, and private corporations.

The operation was a collaborative effort between the Policía Nacional and the Guardia Civil, with support from Europol, Homeland Security Investigations (HSI) of the United States, and Spain’s National Intelligence Center (CNI).

The detained individual faces charges of unauthorized access to systems, data breaches, computer sabotage, and money laundering.

Multinational Targets and Sophisticated Techniques

The hacker allegedly targeted high-profile entities such as Spain’s Ministry of Defense, the National Mint and Stamp Factory, the Ministry of Education, NATO, U.S. Army databases, and United Nations systems.

Spanish universities, the Generalitat Valenciana, and private enterprises were also victimized. Using pseudonyms on dark web forums, the suspect claimed responsibility for the attacks, often publicizing or selling stolen information.

Authorities revealed that the hacker demonstrated advanced technical expertise, utilizing anonymous messaging apps, encrypted browsing networks, and false identities to avoid detection.

Notably, their tactics included exploiting vulnerabilities to access databases containing sensitive employee and client information and deploying defacements to publicly humiliate victims.

Cryptocurrency Accounts Seized

During a search of the suspect’s residence, investigators confiscated multiple devices and discovered over 50 cryptocurrency accounts holding a variety of assets.

Specialists are analyzing the seized materials, with law enforcement suggesting that further criminal activities could be uncovered.

The suspect’s knowledge of blockchain technology enabled the laundering of proceeds from illicit activities, making efforts to track funds particularly challenging.

The investigation began in February 2024 after a Madrid-based business association reported stolen data posted on a dark web forum.

Further probes connected the suspect to several high-profile breaches, culminating in an attack on Spain’s Guardia Civil and Ministry of Defense databases in December 2024.

The breach prompted intensified efforts by the Guardia Civil’s Central Operational Unit, which ultimately identified and located the hacker.

This arrest highlights the importance of cross-border cooperation in combating cybercrime. The joint work of Spanish law enforcement with international partners like Europol and HSI was integral to the operation’s success.

As the investigation continues, officials emphasize the ongoing need for robust cybersecurity measures to safeguard critical infrastructure.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the...