Teen swatting suspects arrested in Hungary and Romania

Hungarian and Romanian police have arrested four young suspects in connection with bomb threats, false emergency calls and the misuse of personal data — part of online swatting incidents that prompted repeated police deployments across the region.

In a statement earlier this week, Hungarian police said the suspects include a 17-year-old Romanian national and three Hungarians aged 16, 18 and 20. Law enforcement raided their homes earlier this month, seizing computers and mobile phones as part of a joint investigation.

The probe began in mid-July after police across Hungary received a series of alarming reports, including threats to bomb schools, religious institutions and residential buildings, as well as warnings of planned attacks on police units and threats to kill named individuals. Each report triggered emergency responses before authorities determined the calls were false.

Authorities said the incidents were part of coordinated swatting and doxing campaigns — tactics that involve filing fake reports of serious crimes and leaking personal information to intimidate or harass victims. Police said the suspects initially contacted victims on the Discord app, obtained their phone numbers and personal details, and then used that information to place false emergency calls in their names.

According to Hungarian police, the 16-year-old suspect was questioned on suspicion of threatening the public but denied the charges and was released pending further proceedings. The 17-year-old Romanian was charged with terrorist acts, making threats to endanger the public, multiple counts of false reporting and misuse of personal data. The legal status of the two older Hungarian suspects has yet to be determined, as investigators analyze seized data to clarify their roles.

In January 2025, bomb threat emails were sent to more than 200 schools and other educational institutions across Hungary, prompting temporary closures, authorities said at the time. No explosives were found. Officials said the messages, which contained similar wording, were likely from a single individual. It is unclear whether those incidents are connected to the suspects arrested this week.

In a separate investigation announced earlier this week, Romanian authorities said they had uncovered an online marketplace allegedly designed to allow users to hire assassins while concealing identities and financial transactions. Two Romanian nationals are under investigation in connection with that operation.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Next Post

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

Related Posts

Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts between June and August 2025, coinciding with heightened geopolitical tensions between Iran and Israel. "UNK_SmudgedSerpent leveraged domestic political lures, including societal change in Iran and investigation into the
Read More

Security Bug in StealC Malware Panel Let Researchers Spy on Threat Actor Operations

Cybersecurity researchers have disclosed a cross-site scripting (XSS) vulnerability in the web-based control panel used by operators of the StealC information stealer, allowing them to gather crucial insights on one of the threat actors using the malware in their operations. "By exploiting it, we were able to collect system fingerprints, monitor active sessions, and – in a twist that will
Read More