Tuesday, February 11, 2025
HomeCyber Security NewsAuthorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Published on

SIEM as a Service

Follow Us on Google News

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their alleged involvement in ransomware operations that inflicted global losses exceeding $16 million.

The arrests, part of the multinational “Operation PHOBOS AETOR,” were executed in collaboration with Swiss and U.S. law enforcement agencies.

The suspects, two men, and two women were apprehended during coordinated raids at four locations: Mono Soi Palai, Supalai Palm Spring, Supalai Vista Phuket, and Phyll Phuket x Phuketique Phyll. Police confiscated over 40 digital devices, including mobile phones, laptops, and cryptocurrency wallets, which were allegedly used in criminal activities.

Operation PHOBOS AETOR

Ransomware Operation on a Global Scale

As per a report by Khao Sod English report, the operation targeted an international cybercrime group responsible for deploying the Phobos ransomware.

Between April 2023 and October 2024, the group reportedly attacked 17 companies in Switzerland, as well as numerous other organizations worldwide.

Using sophisticated cyber techniques, the hackers gained unauthorized access to networks, and encrypted data, and demanded substantial cryptocurrency ransoms for decryption keys.

Victims who refused to pay were threatened with public exposure of sensitive data.

Additionally, the hackers employed cryptocurrency mixing services to obscure their transactions and evade detection, making their digital trail nearly untraceable.

The operation affected over 1,000 victims globally, with damages estimated at $16 million (approximately 560 million baht).

This high-profile arrest highlights the importance of international cooperation in combating cybercrime.

Acting on an urgent request from Swiss and U.S. authorities, Thai officers from the Cyber Crime Investigation Bureau (CCIB), led by Police Lieutenant General Trairong Phiwphan, executed the raids alongside Immigration Police and Region 8 Police.

 The suspects wanted on Interpol warrants, were found to be part of a transnational criminal organization.

The suspects face charges of Conspiracy to Commit an Offense Against the United States and Conspiracy to Commit Wire Fraud.

While their identities remain undisclosed, evidence collected during the arrests is expected to be critical in advancing investigations.

Ransomware attacks have become a significant global threat, targeting businesses, institutions, and individuals alike.

The takedown of this operation underscores the increasing need for law enforcement agencies worldwide to collaborate in addressing the growing sophistication of cybercriminals.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free



Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks.According...

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical...

Enhanced IllusionCAPTCHA: Advanced Protection Against AI-Powered CAPTCHA Attacks

As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities.Recent studies...

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat

January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks.According...

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical...

Enhanced IllusionCAPTCHA: Advanced Protection Against AI-Powered CAPTCHA Attacks

As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities.Recent studies...