Tuesday, March 4, 2025
HomeInternetEuropol Take Down the Oldest Rex Mundi Hacker Group

Europol Take Down the Oldest Rex Mundi Hacker Group

Published on

SIEM as a Service

Follow Us on Google News

The Internet oldest hacker group Rex Mundi was taken down supported by the Europol and the Joint Cybercrime Action Taskforce (J-CAT).

Rex Mundi hacker group was active since at least 2012, they cracked into several organizations and blackmail organizations demanding ransom.

They involved in the chain of attacks and contains a long list of victims AmeriCash Advance, Webassur, Drake International, Buy Way, Hoststar, Web solutions.it, Numericable, Habeas, AlfaNet, Domino’s Pizza, and the Swiss bank Banque Cantonale de Geneve (BCGE).

In last may 2017 a British company was the victim of the hacker group, a large amount of customer data has been compromised, the attack was claimed by “Rex Mundi” and they shared a number of login details to the company to prove they had access to the data.

“The French-speaking person also demanded a ransom of either almost EUR 580 000 for the non-disclosure of the customer data or over EUR 825 000 for information on the security breach and how to handle it. For each day the company failed to pay, there would be a ransom of EUR 210 000.”

With the information provided by Metropolitan Police in the UK, the international operation has been started. Five people from the hacker group were arrested by French authorities in June 2017 and the main suspect admitted that he “involved in blackmail but hired the services of a hacker on the dark web to carry out the cyber-attack.” reads Europol statement.

The French police arrested other two Hackers in October 2017 and the last participant in the group was also French national with coding skills and he was arrested in Thailand.

“As indicated in the report, for such financially motivated extortion attempts, attacks are typically directed at medium-sized or large enterprises, with payment almost exclusively demanded in Bitcoins.”

Also Read

1. Hackers Used Default/weakest Credentials for IoT Botnet Command and Control Server
2. China Government Hackers Compromised U.S Navy Contractor Computers & Stolen 614 gigabytes of Highly Sensitive Data.
3. Hackers Now Switching to Telegram as a Secret Communication Medium for Underground Cybercrimes

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

AeroNet Wireless Launches 10Gbps Internet Plan: A Landmark Moment in Puerto Rico’s Telecommunications Industry

The telecom company AeroNet Wireless announced the launch of its new 10Gbps speed Internet...

10 Cybersecurity Threats in 2024 and How to Protect Yourself

Cybersecurity Threats deal with emerging dangers and include protecting and preventing means against hacker...