Wednesday, April 9, 2025
HomeInternetEuropol Take Down the Oldest Rex Mundi Hacker Group

Europol Take Down the Oldest Rex Mundi Hacker Group

Published on

SIEM as a Service

Follow Us on Google News

The Internet oldest hacker group Rex Mundi was taken down supported by the Europol and the Joint Cybercrime Action Taskforce (J-CAT).

Rex Mundi hacker group was active since at least 2012, they cracked into several organizations and blackmail organizations demanding ransom.

They involved in the chain of attacks and contains a long list of victims AmeriCash Advance, Webassur, Drake International, Buy Way, Hoststar, Web solutions.it, Numericable, Habeas, AlfaNet, Domino’s Pizza, and the Swiss bank Banque Cantonale de Geneve (BCGE).

- Advertisement - Google News

In last may 2017 a British company was the victim of the hacker group, a large amount of customer data has been compromised, the attack was claimed by “Rex Mundi” and they shared a number of login details to the company to prove they had access to the data.

“The French-speaking person also demanded a ransom of either almost EUR 580 000 for the non-disclosure of the customer data or over EUR 825 000 for information on the security breach and how to handle it. For each day the company failed to pay, there would be a ransom of EUR 210 000.”

With the information provided by Metropolitan Police in the UK, the international operation has been started. Five people from the hacker group were arrested by French authorities in June 2017 and the main suspect admitted that he “involved in blackmail but hired the services of a hacker on the dark web to carry out the cyber-attack.” reads Europol statement.

The French police arrested other two Hackers in October 2017 and the last participant in the group was also French national with coding skills and he was arrested in Thailand.

“As indicated in the report, for such financially motivated extortion attempts, attacks are typically directed at medium-sized or large enterprises, with payment almost exclusively demanded in Bitcoins.”

Also Read

1. Hackers Used Default/weakest Credentials for IoT Botnet Command and Control Server
2. China Government Hackers Compromised U.S Navy Contractor Computers & Stolen 614 gigabytes of Highly Sensitive Data.
3. Hackers Now Switching to Telegram as a Secret Communication Medium for Underground Cybercrimes

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Apache mod_auth_openidc Flaw Lets Unauthenticated Users Access Protected Data

A critical flaw in Apache mod_auth_openidc (versions ≤2.4.16.10) allows unauthenticated attackers to bypass authentication and access...

NCSC Issues Alert on MOONSHINE and BADBAZAAR Mobile Malware

GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has...

20 Best Incident Response Tools in 2025

In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches,...

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

AeroNet Wireless Launches 10Gbps Internet Plan: A Landmark Moment in Puerto Rico’s Telecommunications Industry

The telecom company AeroNet Wireless announced the launch of its new 10Gbps speed Internet...

10 Cybersecurity Threats in 2024 and How to Protect Yourself

Cybersecurity Threats deal with emerging dangers and include protecting and preventing means against hacker...