Hacker behind over 90 high-profile data leaks worldwide arrested in Thailand

Avatar

Singaporean and Thai law enforcement have arrested a 39-year-old man in Bangkok suspected of carrying out dozens of high-profile data breaches worldwide, authorities said on Thursday.

The hacker, who operated under the aliases ALTDOS, DESORDEN, GHOSTR and 0mid16B, has been among the most active cybercriminals in the Asia-Pacific region since 2021, according to Singapore-based cybersecurity firm Group-IB, which collaborated with the police to track the hacker down.

His activities led to more than 90 data leaks worldwide, compromising over 13 terabytes of personal data, which he then sold on the dark web. The authorities did not specify any victims but said they include companies in the healthcare, retail, finance, logistics, insurance and recruitment sectors — primarily in Thailand, Singapore, Malaysia, Indonesia, and India, but also in the U.K., Canada, and the U.S. 

During the suspect’s arrest, Thai authorities seized multiple laptops, electronic devices, and luxury goods, including Chanel bags, watches and jewelry, allegedly purchased with proceeds from selling stolen data.

Researchers said extortion was the hacker’s primary goal. Unlike ransomware actors, he did not immediately announce the leaks on dark web forums. Instead, he leaked the stolen data to media outlets or regulatory bodies, increasing reputational and financial damage to businesses.

In some cases, he directly contacted affected customers via email or instant messages to pressure companies into submission. Occasionally, he also encrypted victim databases to exert further control, according to Group-IB.

Singaporean police said in a statement that they began investigating data breaches linked to the suspect in 2020. According to Group-IB, tracking him was difficult because he frequently changed his online aliases and tactics.

“At times, he created a new digital persona to avoid correlation with previous attacks,” researchers said.

Initially, the hacker was highly regarded on data leak forums for possessing a large number of unique data leaks, which allowed him to demand higher prices for the stolen data. However, he was later banned from certain forums for scamming and operating multiple accounts, researchers said.

Police have not disclosed the suspect’s identity, but Thai media reported that he goes by the name Chingwei. According to these reports, he admitted to hacking over 70 databases and said he acted alone, targeting big companies while avoiding government agencies.

NewsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

Next Post

5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs

Related Posts

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots that limit full visibility. Complex deployment processes.
Avatar
Read More

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. "The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite," the international non-governmental
Avatar
Read More