Sunday, May 4, 2025
HomeAndroidHackers Arrested For Stealing Banking Credentials Using Android Malware

Hackers Arrested For Stealing Banking Credentials Using Android Malware

Published on

SIEM as a Service

Follow Us on Google News

An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada.

The cybercrime incident resulted in the perpetrator acquiring a total amount of more than UAH 3.5 million.

Modus Operandi of Hacker

In Vinnytsia, Ukraine, a hacker has developed multiple websites providing free software downloads. These downloads are often pirated and potentially contain malware or viruses that compromise the security of the user’s device.

- Advertisement - Google News

The individual initiated a comprehensive online advertising initiative to promote the websites and enhance their credibility. This involved various technical strategies aimed at increasing the trustworthiness of the websites.

After users download and install software for free, they inadvertently install concealed malware within the programs.

The malware in question could infiltrate the devices without the user’s knowledge, providing the hacker unrestricted access to the system.

The perpetrator successfully monetized the unauthorized access by selling the exfiltrated data to nefarious actors on the internet. The proceeds generated from the sale were utilized to purchase a Mercedes-Benz GLE car, reads the report.

The Investigation:

Assisted by the KORD special force, the law enforcement personnel successfully located and apprehended the perpetrator.

Authorities conducted three comprehensive searches and confiscated a vehicle worth approximately 2.5 million hryvnias. We also obtained other crucial pieces of evidence during the operation.

The accused is liable for a maximum prison term of 8 years and seizure of assets due to charges of engaging in money laundering, hacking activities, and developing and circulating malicious software.

The investigation is underway to ascertain the identities of any possible accomplices involved in the case.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA

Cybercriminals are intensifying their efforts to undermine multi-factor authentication (MFA) through adversary-in-the-middle (AiTM) attacks,...

Threat Actors Target Critical National Infrastructure with New Malware and Tools

A recent investigation by the FortiGuard Incident Response (FGIR) team has uncovered a sophisticated,...

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

StealC, a notorious information stealer and malware downloader first sold in January 2023, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Threat Actors Target Critical National Infrastructure with New Malware and Tools

A recent investigation by the FortiGuard Incident Response (FGIR) team has uncovered a sophisticated,...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...