Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Ukraine Cyber Police Dismantles Major Cryptojacking Ring with 5,000 Hacked Accounts

by Jane Doe
June 7, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

A skilled cryptojacker has been seized by the Cyber Police Regiment of Ukraine; the perpetrator is simply accused of infiltrating the accounts of more than 5,000 users, which are all of one of the world’s largest international hosting companies.

It estimates that the large operation, which engaged in illegal cryptocurrency mining by clandestinely redirecting server resources, caused $4.5 million in damages.

The suspect, who hails from Poltava, had reportedly been working since 2018 in a carefully planned manner to take advantage of the weaknesses in the infrastructure of a number of international companies.

The person accessed customer accounts that were used to host websites and platforms with open source intelligence (OSINT) methods. Within the infected servers, VMs were then created to mine cryptocurrency without being detected, effectively leeching computing power and profit for the attacker.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

According to the investigation, the hacker constantly changes his place of residence, travelling from Poltava, Odesa, Zaporizhzhia, and Dnipropetrovsk (Poltava), hoping to confuse the trace. In the raids, authorities seized a cache of digital evidence: computers, cellphones and banking cards.

The forensic examination revealed the suspect’s presence on a number of cut forums and revealed him to have links to stolen email credentials, cryptocurrency wallets containing illicitly mined coins, and custom scripts and tools for data theft and remote access.

Cryptojacking, an emerging threat in cybersecurity, enables attackers to use victim’s machines for mining cryptocurrency without their knowledge or authorization. This parasitic operation can drain the financial resources of both them and their employers with higher electricity bills, reduced system performance, and possible degradation of hardware. For hosting companies, that means lots of huge a unauthorized loads on resources, and a big fat bill to pay for it all.

The person now have been charged under Ukrainian criminal law with a severe punishment in form of up to 15 years in prison and a 3-year long ban from the engage in high-risk activities. The investigation is continuing and more charges could be laid as fresh evidence comes to light, police said.

Following this major crackdown, Ukrainian law enforcement together with Europol is calling for users and businesses to check their online security settings and practises. Making sure employees use strong, unique passwords and MFA for all cloud accounts, reviewing account activity on a regular basis, and quickly stopping access for unfamiliar devices or apps can help to defend against potential threats.

This is a painful reminder of the omnipresent and increasingly aggressive nature of cybercrime and highlights that – despite the significant resources invested by both the public and private sector – the criminals have developed sophisticated techniques that can be hard to counter.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

23andMe Faces £2.31 Million Fine From ICO for Insufficient Data Security

June 23, 2025

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

April 21, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.