Thursday, March 28, 2024

Europol Take Down the Oldest Rex Mundi Hacker Group

The Internet oldest hacker group Rex Mundi was taken down supported by the Europol and the Joint Cybercrime Action Taskforce (J-CAT).

Rex Mundi hacker group was active since at least 2012, they cracked into several organizations and blackmail organizations demanding ransom.

They involved in the chain of attacks and contains a long list of victims AmeriCash Advance, Webassur, Drake International, Buy Way, Hoststar, Web solutions.it, Numericable, Habeas, AlfaNet, Domino’s Pizza, and the Swiss bank Banque Cantonale de Geneve (BCGE).

In last may 2017 a British company was the victim of the hacker group, a large amount of customer data has been compromised, the attack was claimed by “Rex Mundi” and they shared a number of login details to the company to prove they had access to the data.

“The French-speaking person also demanded a ransom of either almost EUR 580 000 for the non-disclosure of the customer data or over EUR 825 000 for information on the security breach and how to handle it. For each day the company failed to pay, there would be a ransom of EUR 210 000.”

With the information provided by Metropolitan Police in the UK, the international operation has been started. Five people from the hacker group were arrested by French authorities in June 2017 and the main suspect admitted that he “involved in blackmail but hired the services of a hacker on the dark web to carry out the cyber-attack.” reads Europol statement.

The French police arrested other two Hackers in October 2017 and the last participant in the group was also French national with coding skills and he was arrested in Thailand.

“As indicated in the report, for such financially motivated extortion attempts, attacks are typically directed at medium-sized or large enterprises, with payment almost exclusively demanded in Bitcoins.”

Also Read

1. Hackers Used Default/weakest Credentials for IoT Botnet Command and Control Server
2. China Government Hackers Compromised U.S Navy Contractor Computers & Stolen 614 gigabytes of Highly Sensitive Data.
3. Hackers Now Switching to Telegram as a Secret Communication Medium for Underground Cybercrimes

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles