Group Incidents

4 Arrested for targeting dating sites2017-02-17 00:00:00 UTC

4 Arrested for targeting dating sites
3 detained for manipulating ATM terminals and accused offences of that are in the nature of a organized criminal group or computer fraud gang.

20 indicted for fraud2014-04-09 00:00:00 UTC

20 indicted for fraud
3 members of russian hacker group Shaltay-Boltay arrested for hacking influential businessmen’s correspondence

9 arrested for lurk malware2017-01-25 00:00:00 UTC

9 arrested for lurk malware

21 indicted for piracy2002-06-12 00:00:00 UTC

21 indicted for piracy

2 arrested for hacking2017-01-10 00:00:00 UTC

2 arrested for hacking incidents after Italian police worked with the FBI and started an operation named Eye Pyramid to crackdown on malware infecting businesses and stealing confidential data.

5 arrested for hacking ATMs2017-01-27 00:00:00 UTC

5 arrested for hacking ATMs
4 hackers arrested for stealing e-vouchers

2 arrested for breaching CCTV network2017-01-19 00:00:00 UTC

2 arrested for breaching CCTV network
3 Chinese Traders arrested and Charged With Hacking Law Firms
3 more detained for government attacks

9 suspect hackers detained2016-12-26 00:00:00 UTC

9 suspect hackers detained. the hackers are said to of attacked websites in relational for a new passed law that came in to affect on December 16th this year.
5 suspects have been detained for alleged involvement in the latest hacking of government and security agency websites, some of which were knocked out of service temporarily due to cyberattacks.
According to multiple UK media reports citing both Three and the National Crime Agency NCA, hackers gained access to a Three database containing the account details of possibly six million customers. Payment data, including bank account and card numbers, was not exposed, but the hackers did have access to customer names, addresses, phone numbers, and dates of birth. It is believed that the hackers used the database to find customers eligible for handset updates and then place orders for the new phones, intercepting the parcels as they arrived and reselling the stolen phones.
It began in 2007 with the development of proprietary malware, which they disseminated through malicious emails purporting to be legitimate from such entities as Western Union, Norton AntiVirus and the IRS. When recipients clicked on an attached file, the malware was surreptitiously installed onto their computer. This malware harvested email addresses from the infected computer, such as from contact lists or email accounts, and then sent malicious emails to these harvested email addresses. The defendants infected and controlled more than 60,000 individual computers, primarily in the United States. Controlling these computers allowed the defendants to harvest personal information, such as credit card information, user names and passwords. They disabled victims’ malware protection and blocked the victims’ access to websites associated with law enforcement. Controlling the computers also allowed the defendants group to use the processing power of the computer to solve complex algorithms for the financial benefit of the group, a process known as cryptocurrency mining. The defendants used stolen email credentials to copy a victim’s email contacts. They also activated files that forced infected computers to register email accounts with AOL. The defendants registered more than 100,000 email accounts using this method. They then sent malicious emails from these addresses to the compromised contact lists. Through this method, they sent more than 11 million malicious emails. When victims with infected computers visited websites such as Facebook, PayPal, eBay or others, the defendants would intercept the request and redirect the computer to a nearly identical website they had created. The defendants would then steal account credentials. They used the stolen credit card information to fund their criminal infrastructure, including renting server space, registering domain names using fictitious identities and paying for Virtual Private Networks VPNs which further concealed their identities. The defendants were also able to inject fake pages into legitimate websites, such as eBay, to make victims believe they were receiving and following instructions from legitimate websites, when they were actually following the instructions of the defendants. They placed more than 1,000 fraudulent listings for automobiles, motorcycles and other high-priced goods on eBay and similar auction sites. Photos of the items were infected with malware, which redirected computers that clicked on the image to fictitious webpages designed by the defendants to resemble legitimate eBay pages. These fictitious webpages prompted users to pay for their goods through a nonexistent “eBay Escrow Agent” who was simply a person hired by the defendants. Users paid for the goods to the fraudulent escrow agents, who in turn wired the money to others in Eastern Europe, who in turn gave it to the defendants. The payors/victims never received the items and never got their money back. This resulted in a loss of at least $4 million. The Bayrob group laundered this money by hiring “money transfer agents” and created fictitious companies with fraudulent websites designed to give the impression they were actual businesses engaged in legitimate financial transactions. Money stolen from victims was wired to these fraudulent companies and then in turn wired to Western Union or Money Gram offices in Romania. European “money mules” used fake identity documents to collect the money and deliver it to the defendants, according to the indictment
The individuals arrested are suspected of paying for stressers and booters services to maliciously deploy software to launch DDoS attacks, which flood websites and web servers with massive amount of data, leaving them inaccessible to users. The tools used are part of the criminal ‘DDoS for hire’ facilities for which hackers can pay and aim it at targets at their choosing. In total 34 people got arrested and a further 101 people detained and questioned.

3 Arrested for hacking Emails2016-12-05 00:00:00 UTC

3 Arrested for hacking Emails accounts and conducting fraud.

5 Arrested for links to Avalanche2016-11-30 00:00:00 UTC

5 Arrested for links to known criminal network named Avalanche
14 people were arrested in the UK on suspicion of offences including laundering stolen money for international cyber criminals.
6 police officers jailed after they setup a business named Active Investigation Services AIS which was a hacker for hire front. The company charged clients between £5,000 and £7,000 to hack into computers and £6,000 to bug telephone lines. Among the illegal services offered by the company were accessing medical records, bank details and phone bills as well as fitting bugs to peoples cars.

2 Dutch hackers arrested1992-01-27 00:00:00 UTC

2 Dutch hackers arrested

2 arrested for malware attacks2009-11-18 00:00:00 UTC

a man and women arrested for using the ZeuS or Zbot virus to infect computers and download data, including bank account numbers, credit card passwords and other personal information.
14 detained after ATM Gang Broken Up by Europol and DIICOT
2 Alleged vDOS Proprietors Arrested in Israel
Arrested on charges related to their alleged roles in the computer hacking of several senior U.S. government officials and U.S. government computer systems. According to charging documents filed with the court, Boggs and Liverman conspired with members of a hacking group that called itself “Crackas With Attitude.” From about October 2015 to February 2016, the group used “social engineering” hacking techniques, including victim impersonation, to gain unlawful access to the personal online accounts of senior U.S. government officials, their families, and several U.S. government computer systems. In some instances, members of the conspiracy uploaded private information that they obtained from victims’ personal accounts to public websites; made harassing phone calls to victims and their family members; and defaced victims’ social media accounts.
A group who used paypal to filter stolen funds has been convicted,

3 charged with hacking offences1991-04-01 00:00:00 UTC

for the first time in the united kingdom 3 charged with hacking offences

3 Arrested for m00p malware2006-06-26 00:00:00 UTC

3 persons detained, 2 in UK and 1 Finland in relation to the m00p malware.

19 Arrested over online banking raids2010-09-29 00:00:00 UTC

The Metropolitan Police Central eCrime Unit PCeU said the 15 men and four women, who were arrested in London on Tuesday morning, are suspected of using the Zeus data-stealing Trojan to capture login details and gain access to online bank accounts. The gang allegedly stole around £6m in a three-month period from UK banks