Ukrainian police arrest hacker who used hosting firm’s servers to mine cryptocurrency

Avatar

Ukrainian police, with assistance from Europol, have arrested a 35-year-old man accused of hacking into thousands of user accounts at an international hosting company and using its infrastructure to illegally mine cryptocurrency, authorities said Wednesday.

The suspect, a native of the central Ukrainian city of Poltava, had been conducting cyberattacks since at least 2018, police said. He allegedly gathered information from open sources to identify vulnerabilities in the systems of various international companies.

According to investigators, the hacker gained unauthorized access to more than 5,000 user accounts belonging to an unnamed global hosting provider that rents out servers to businesses operating websites and online platforms. Once inside, he allegedly deployed virtual machines on the company’s infrastructure to mine cryptocurrency without permission.

Ukrainian cyber police said the unauthorized mining operation caused an estimated $4.5 million in losses to the company.

During raids at several locations, officers seized computers, mobile phones, banking cards and other equipment. Forensic analysis revealed that the suspect maintained multiple accounts on hacker forums and used various malicious tools, such as software scripts for launching and managing crypto-mining operations and tools for data collection and remote control of compromised systems.

The man frequently changed his residence to avoid detection, police said. The investigation is ongoing.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

Next Post

Cyber Security Expo

Related Posts

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before.  Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primary
Avatar
Read More

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an
Avatar
Read More