Wednesday, December 11, 2024
HomeAndroidHackers Arrested For Stealing Banking Credentials Using Android Malware

Hackers Arrested For Stealing Banking Credentials Using Android Malware

Published on

SIEM as a Service

An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada.

The cybercrime incident resulted in the perpetrator acquiring a total amount of more than UAH 3.5 million.

Modus Operandi of Hacker

In Vinnytsia, Ukraine, a hacker has developed multiple websites providing free software downloads. These downloads are often pirated and potentially contain malware or viruses that compromise the security of the user’s device.

- Advertisement - SIEM as a Service

The individual initiated a comprehensive online advertising initiative to promote the websites and enhance their credibility. This involved various technical strategies aimed at increasing the trustworthiness of the websites.

After users download and install software for free, they inadvertently install concealed malware within the programs.

The malware in question could infiltrate the devices without the user’s knowledge, providing the hacker unrestricted access to the system.

The perpetrator successfully monetized the unauthorized access by selling the exfiltrated data to nefarious actors on the internet. The proceeds generated from the sale were utilized to purchase a Mercedes-Benz GLE car, reads the report.

The Investigation:

Assisted by the KORD special force, the law enforcement personnel successfully located and apprehended the perpetrator.

Authorities conducted three comprehensive searches and confiscated a vehicle worth approximately 2.5 million hryvnias. We also obtained other crucial pieces of evidence during the operation.

The accused is liable for a maximum prison term of 8 years and seizure of assets due to charges of engaging in money laundering, hacking activities, and developing and circulating malicious software.

The investigation is underway to ascertain the identities of any possible accomplices involved in the case.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Latest articles

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center...

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

Hackers Deploy Weaponized LNK Files for Malicious Payload Delivery

Researchers reported a phishing attack on December 4th, 2024, where malicious emails purportedly from...

APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed an advanced cyber...