Monday, June 16, 2025
HomeCyber Security NewsAuthorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Published on

SIEM as a Service

Follow Us on Google News

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their alleged involvement in ransomware operations that inflicted global losses exceeding $16 million.

The arrests, part of the multinational “Operation PHOBOS AETOR,” were executed in collaboration with Swiss and U.S. law enforcement agencies.

The suspects, two men, and two women were apprehended during coordinated raids at four locations: Mono Soi Palai, Supalai Palm Spring, Supalai Vista Phuket, and Phyll Phuket x Phuketique Phyll. Police confiscated over 40 digital devices, including mobile phones, laptops, and cryptocurrency wallets, which were allegedly used in criminal activities.

- Advertisement - Google News

Operation PHOBOS AETOR

Ransomware Operation on a Global Scale

As per a report by Khao Sod English report, the operation targeted an international cybercrime group responsible for deploying the Phobos ransomware.

Between April 2023 and October 2024, the group reportedly attacked 17 companies in Switzerland, as well as numerous other organizations worldwide.

Using sophisticated cyber techniques, the hackers gained unauthorized access to networks, and encrypted data, and demanded substantial cryptocurrency ransoms for decryption keys.

Victims who refused to pay were threatened with public exposure of sensitive data.

Additionally, the hackers employed cryptocurrency mixing services to obscure their transactions and evade detection, making their digital trail nearly untraceable.

The operation affected over 1,000 victims globally, with damages estimated at $16 million (approximately 560 million baht).

This high-profile arrest highlights the importance of international cooperation in combating cybercrime.

Acting on an urgent request from Swiss and U.S. authorities, Thai officers from the Cyber Crime Investigation Bureau (CCIB), led by Police Lieutenant General Trairong Phiwphan, executed the raids alongside Immigration Police and Region 8 Police.

 The suspects wanted on Interpol warrants, were found to be part of a transnational criminal organization.

The suspects face charges of Conspiracy to Commit an Offense Against the United States and Conspiracy to Commit Wire Fraud.

While their identities remain undisclosed, evidence collected during the arrests is expected to be critical in advancing investigations.

Ransomware attacks have become a significant global threat, targeting businesses, institutions, and individuals alike.

The takedown of this operation underscores the increasing need for law enforcement agencies worldwide to collaborate in addressing the growing sophistication of cybercriminals.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free



Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...