Sunday, March 9, 2025
HomeCyber AttackLaw enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal...

Law enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal Credit Card Data

Published on

SIEM as a Service

Follow Us on Google News

On 22nd February 2022, Ukrainian Police officials arrested a group of threat actors that were involved in a phishing campaign.

They used a mobile replenishment service as their disguise to conduct various scams involving 70,000 stolen victim data.

The Cyber Police department and the National police came together on this issue which seemed to have made a loss of five million hyrvnias (Ukrainian Currency).

The threat actors were a group of five people including an organizer who created and administered more than 40 phishing websites to obtain details about credit cards from victims. The phishing websites were similar to that of the mobile operator’s website which made the users enter their card details for topping up their account or making a bank transfer. 

Through phishing websites, the attacker has collected information from more than 70,000 people and used it to steal money from those accounts.

The police also stated that the organizer also used paid marketing and analytical resources to make SEO for the phishing websites and make it forefront the search results as well as on social media.

The group also involved three citizens to transfer their illegal funds as a result that they also receive a profit for each fraudulent operation.

The police also seized computer equipment, mobile phones, flash drives, bank cards and also confiscated 2 million hryvnias in cash.

Cyber police also remind the citizens to check on the URL before entering their sensitive information like bank details, CVV, PIN, and card expiry date.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...