Sunday, November 10, 2024
HomeCyber CrimeLaw Enforcement Authorities Dismantled The Hacker Groups Database That Contains Millions of...

Law Enforcement Authorities Dismantled The Hacker Groups Database That Contains Millions of Users Credentials

Published on

Malware protection

European Union Agency with other law enforcement agencies takes down the infamous hacking group known as InfinityBlack database that has managed to sell the complete databases with millions of users’ private credentials on the internet.

This hacking group is well known for distributing stolen credentials, as well as creating and distributing malware or several types of hacking tools.

The European Union Agency for Law Enforcement Cooperation, Europol, continues to collaborate with different national police forces and law enforcement authorities in various operations against hacking or content piracy. 

- Advertisement - SIEM as a Service

As in recent times, Europol has achieved some important achievements to end pirated IPTV (Internet Protocol television), but now they have managed to score somewhat in different areas as well, like the universe of hackers. 

Recently, several Law enforcement agencies joint operations were carried out on April 29, 2020, in Poland, and five people who were members of this hacker group were arrested.

InfinityBlack

The Polish National Police, Policja, has seized various computer equipment, external hard drives, and cryptocurrency wallets with a value of about 100,000 euros. 

InfinityBlack

Along with this, they closed two databases with more than 170 million records in the form of private credentials, obtained mainly in Switzerland. This group of hackers had even created an online sales platform to sell these private credentials on the Dark Web. 

According to the Europol report, the group was perfectly organized into three different teams, each with a specific role and function. Here are roles that each member in the hacking group, InfinityBlack plays:-

  • Some created tools to check the quality of the stolen data.
  • Some members are there who only analyze the stolen data in detail.
  • Some were in charge of selling them in packages on the internet and Dark Web.

Hackers Target the rewards point programs 

Their primary source of stolen data was correlated to the rewards point programs; In fact, they had designed a complex operation to steal thousands of accounts in Switzerland. Moreover, it is estimated that the losses caused by this hacking group, InfinityBlack, were around 50,000 euros, while the damage could have been up to 610,000 euros, as the hackers had access to more accounts. 

All these have become possible due to the joint collaboration of Polish and Swiss law enforcement authorities who were supported by Europol and Eurojust, who stopped all the illegal cyber operations of the hacking group in time.

The Police set them up with the purchase of these data, managing to relate them to users in Poland. Along with these organizations, Europol has also provided technical means and the necessary support so that everything could be concluded satisfactorily.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read:

Law enforcement and Microsoft Shutdown a Major Malware Attack by Mapping 400,000 IP’s

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Interpol Arrested 3 Indonesian Hackers Who have Hacked Hundreds of Ecommerce Websites With JS-Sniffer Malware

Two Massachusetts Men Arrested for Conducting SIM-swapping Attack To Steal Cryptocurrency & Social Media Login

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of a critical vulnerability...

Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information

A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP...

Cisco Flaw Let Attackers Run Command as Root User

A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects...

Researchers Detailed Credential Abuse Cycle

The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a...

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market.Unlike traditional standalone ransomware sales, RaaS...

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their...