Teen swatting suspects arrested in Hungary and Romania

Hungarian and Romanian police have arrested four young suspects in connection with bomb threats, false emergency calls and the misuse of personal data — part of online swatting incidents that prompted repeated police deployments across the region.

In a statement earlier this week, Hungarian police said the suspects include a 17-year-old Romanian national and three Hungarians aged 16, 18 and 20. Law enforcement raided their homes earlier this month, seizing computers and mobile phones as part of a joint investigation.

The probe began in mid-July after police across Hungary received a series of alarming reports, including threats to bomb schools, religious institutions and residential buildings, as well as warnings of planned attacks on police units and threats to kill named individuals. Each report triggered emergency responses before authorities determined the calls were false.

Authorities said the incidents were part of coordinated swatting and doxing campaigns — tactics that involve filing fake reports of serious crimes and leaking personal information to intimidate or harass victims. Police said the suspects initially contacted victims on the Discord app, obtained their phone numbers and personal details, and then used that information to place false emergency calls in their names.

According to Hungarian police, the 16-year-old suspect was questioned on suspicion of threatening the public but denied the charges and was released pending further proceedings. The 17-year-old Romanian was charged with terrorist acts, making threats to endanger the public, multiple counts of false reporting and misuse of personal data. The legal status of the two older Hungarian suspects has yet to be determined, as investigators analyze seized data to clarify their roles.

In January 2025, bomb threat emails were sent to more than 200 schools and other educational institutions across Hungary, prompting temporary closures, authorities said at the time. No explosives were found. Officials said the messages, which contained similar wording, were likely from a single individual. It is unclear whether those incidents are connected to the suspects arrested this week.

In a separate investigation announced earlier this week, Romanian authorities said they had uncovered an online marketplace allegedly designed to allow users to hire assassins while concealing identities and financial transactions. Two Romanian nationals are under investigation in connection with that operation.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Next Post

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

Related Posts

⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
Read More

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper

Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that's delivered by means of a digitally signed, notarized Swift application masquerading as a messaging app installer to bypass Apple's Gatekeeper checks. "Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or ClickFix-style techniques, this sample adopts a more
Read More