Ukrainian police detain cybercriminals trying to sell millions of stolen email and Instagram accounts

Siva Ramakrishnan
Ukrainian cyber police have detained three members of an organized criminal gang suspected of hijacking more than 100 million email and Instagram accounts from users across the world.

Ukrainian cyber police have detained three members of an organized criminal gang suspected of hijacking more than 100 million email and Instagram accounts from users across the world.

The suspects, who are between the ages of 20 and 40, used a technique called brute force, in which attackers attempt to gain access to a targeted account by repeatedly trying  different combinations of usernames and passwords until the correct one is found. According to Ukraine’s law enforcement, the criminals used special software to carry out those attacks. 

The group has been active for about a year, operating from cities across Ukraine. The criminals had an organized structure where the leader assigned tasks to other members. They compiled databases of hijacked accounts and sold them on the darknet to other criminals, who then used this data for fraud — for example, to message the victims’ contacts and ask for money.

Ukraine’s police have also launched an investigation into the potential collaboration of suspects with Russia, since some of the stolen accounts were used to conduct psychological operations (PSYOPS) to promote Russian interests. Typically, these operations involve publishing fakes or anti-Ukrainian posts on social media. 

During the searches in several Ukrainian cities, the law enforcement seized more than 70 pieces of computer equipment, 14 phones, bank cards and more than $3,000 in cash. 

The investigation into the case is still ongoing, and more information may come out soon. If found guilty, the arrested individuals could face up to 15 years in prison.

In February, Ukrainian cyber police arrested two affiliates of the notorious LockBit ransomware gang in Ukraine. The suspects — a father and son — allegedly carried out cyberattacks on behalf of LockBit, affecting people, enterprises, state agencies, and healthcare institutions in France.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

German military officer charged with spying for Russian intelligence services

Next Post

Russia-linked hackers use Smokeloader malware to steal funds from Ukrainian enterprises

Related Posts

Apache Cordova App Harness Targeted in Dependency Confusion Attack

Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries, thus allowing a threat actor to publish a malicious package with the same name to a public package repository. This&
Avatar
Read More

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations

Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations. AT&T LevelBlue Labs, which first observed the malware in late April 2024, said it incorporates features that are designed to thwart static and dynamic analysis and ultimately evade detection. Attack chains leverage phishing emails that
Avatar
Read More