Wednesday, May 21, 2025
HomeAndroidHackers Arrested For Stealing Banking Credentials Using Android Malware

Hackers Arrested For Stealing Banking Credentials Using Android Malware

Published on

SIEM as a Service

Follow Us on Google News

An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada.

The cybercrime incident resulted in the perpetrator acquiring a total amount of more than UAH 3.5 million.

Modus Operandi of Hacker

In Vinnytsia, Ukraine, a hacker has developed multiple websites providing free software downloads. These downloads are often pirated and potentially contain malware or viruses that compromise the security of the user’s device.

- Advertisement - Google News

The individual initiated a comprehensive online advertising initiative to promote the websites and enhance their credibility. This involved various technical strategies aimed at increasing the trustworthiness of the websites.

After users download and install software for free, they inadvertently install concealed malware within the programs.

The malware in question could infiltrate the devices without the user’s knowledge, providing the hacker unrestricted access to the system.

The perpetrator successfully monetized the unauthorized access by selling the exfiltrated data to nefarious actors on the internet. The proceeds generated from the sale were utilized to purchase a Mercedes-Benz GLE car, reads the report.

The Investigation:

Assisted by the KORD special force, the law enforcement personnel successfully located and apprehended the perpetrator.

Authorities conducted three comprehensive searches and confiscated a vehicle worth approximately 2.5 million hryvnias. We also obtained other crucial pieces of evidence during the operation.

The accused is liable for a maximum prison term of 8 years and seizure of assets due to charges of engaging in money laundering, hacking activities, and developing and circulating malicious software.

The investigation is underway to ascertain the identities of any possible accomplices involved in the case.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

PowerDNS Vulnerability Allows Attackers to Trigger DoS Attacks Through Malicious TCP Connections

PowerDNS has released a critical security update to address a vulnerability in its DNSdist...

VanHelsing Ransomware Builder Exposed on Hacker Forums

The cybersecurity landscape reveal that the VanHelsing ransomware operation has experienced a significant security...

IBM Warns: One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials

IBM X-Force's 2024 cybersecurity report, nearly one-third of cyber intrusions now rely on identity-based...

19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool

Massachusetts college student stands accused of orchestrating a sweeping cyberattack on PowerSchool, a widely...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

LockBit Internal Data Leak Reveals Payload Creation Methods and Ransom Demands

The notorious ransomware group LockBit inadvertently suffered a major data breach, exposing the inner...

Hazy Hawk Targets DNS Vulnerabilities to Hijack Cloud Resources and Spread Malware

The threat actor gained attention in February 2025 after successfully hijacking a subdomain of...

More_Eggs Malware Uses Job Application Emails to Distribute Malicious Payloads

The More_Eggs malware, operated by the financially motivated Venom Spider group (also known as...