Sunday, February 9, 2025
HomeCyber Security NewsFBI’s Most Wanted Hacker Arrested in Malpensa

FBI’s Most Wanted Hacker Arrested in Malpensa

Published on

SIEM as a Service

Follow Us on Google News

A 43-year-old Italian-Australian man, one of the FBI’s most wanted hackers, was apprehended at Milan’s Malpensa Airport after evading capture for over three years.

The arrest, carried out by Milan State Police officers, marks a significant victory in the global fight against cybercrime.

The suspect, whose identity remains undisclosed, is alleged to be a key figure in a sophisticated computer fraud scheme that amassed an astounding $31 million.

The U.S. District Court of North Carolina issued an arrest warrant, accusing him of participating in a criminal conspiracy involving computer fraud, damaging protected computer systems, and money laundering.

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

The FBI recognized the international nature of the case and sought assistance from Italian authorities through the Service for International Police Cooperation.

The agency’s cyber specialist at the Italian Embassy in Washington played a crucial role in facilitating this collaboration.

Most Wanted Hacker Arrested

The Postal Police of Milan, working with the Border Police Office of Malpensa, executed a swift and precise operation.

Within hours of receiving intelligence about the suspect’s travel plans, they identified him on a flight from Singapore and apprehended him upon landing.

The scam allegedly perpetrated by the suspect and his associates targeted vulnerable internet users, particularly the elderly.

Victims’ computers would display a message claiming their system was “compromised” and blocked due to an error.

Users were then directed to contact a fake call center for urgent technical assistance to prevent data loss and system deactivation. Upon calling, victims were coerced into making payments for non-existent technical support.

During the arrest, the suspect possessed several thousand euros in cash, multiple computer devices, credit cards, and two high-value watches. These items may serve as crucial evidence in the ongoing investigation.

According to the Ansa report, the severity of the charges is reflected in the potential punishment under U.S. law, which stipulates a maximum sentence of 30 years imprisonment when the crime involves at least ten victims over 55.

Currently held in Busto Arsizio prison near Varese, the suspect awaits extradition to the United States for trial.

This arrest follows a similar operation in July, where Italian authorities apprehended another FBI-wanted cybercriminal.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...