Kazakhstan detains over 140 for allegedly selling citizens’ data via Telegram channels

Avatar

Kazakh authorities said they busted a network that was using Telegram to illegally sell citizens’ personal data extracted from government databases.

More than 140 suspects were arrested in connection with the scheme, including business owners and alleged administrators of Telegram channels used to trade the stolen information, officials said on Monday.

Authorities reported that some of the extracted data was shared with debt collection agencies, several of which were searched during the operation. The government seized more than 400 computers and other electronic devices believed to have been used in the illegal activity.

If convicted, the suspects could face up to five years in prison and a fine.

The Ministry of Internal Affairs said it is continuing efforts to identify all parties involved and pledged to strengthen measures to protect digital privacy and combat the illicit trade in personal information.

Authorities also released a video showing armed officers storming several business centers, searching open-plan offices and escorting detained suspects onto a bus.

Illegal call centers — often unlicensed and operating without regulatory oversight — are common in Eastern Europe, including countries like Russia, Ukraine and Belarus. These centers frequently engage in fraudulent activities.

In April, police in Minsk detained employees of five fraudulent call centers that had been operating since 2022 under the guise of investment brokerages. The networks primarily targeted Russian citizens, promising high returns on cryptocurrency investments. In reality, victims lost their life savings.

In a separate case in December, Russian police uncovered three illegal call centers in Moscow that had defrauded tens of thousands of people across more than 20 countries in Europe and Asia.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

NHS calls for 1 million blood donors as UK stocks remain low following cyberattack

Next Post

New hacker group uses LockBit ransomware variant to target Russian companies

Related Posts

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. "A threat actor used a known
Avatar
Read More

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

Cybersecurity researchers have flagged a supply chain attack targeting over a dozen packages associated with GlueStack to deliver malware. The malware, introduced via a change to "lib/commonjs/index.js," allows an attacker to run shell commands, take screenshots, and upload files to infected machines, Aikido Security told The Hacker News, stating these packages collectively account for nearly 1
Avatar
Read More