banner Expire 25 October 2025
adv exp at 30 July 2025
banner Expire 10 February 2026
Ad End 1 November 2025
ad End 5 May 2025
ad End 25 October 2025
Ad End 4 April 2026
What's new
UniCvv
banner Expire 20 October 2024
banner Expire 15 January 2025
Money Club cc shop
Wizard's shop 2.0
Ad Ends 13 July 2025
Carding Game
BidenCash Shop
Carding.pw carding forum
Kfc CLub
Yale Lodge
best shop

Super hacker group arrested in Poland

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
8,045
Reaction score
1,019
Points
212
Awards
2
  • trusted user
  • Rich User
The group is responsible for ransomware and malware attacks, SIM swapping, extortion with threats of explosion, etc.




Polish law enforcement officers arrested four alleged members of a hacker super-group that is actively involved in various cybercriminal activities. The group is responsible for ransomware attacks, malware distribution, SIM swapping, banking fraud, administration of fake online stores, and even extortion with explosion threats. Four suspects were arrested this week, and four more are under investigation.

An investigation into the activities of a cybercriminal group began in May 2019, when a certain Lukasz K. hired hackers via the Internet in order to frame his business rival. The cybercriminals spoofed the businessman's email address and sent a letter to the administration of one of the schools in Lechitsa on his behalf, threatening to blow up the building if the ransom was not paid. As a result, the competitor was arrested and spent two days in custody until the police found out what happened.

After being released from custody, the businessman hired a private detective to find out who set him up. When the cybercriminals realized that they were being followed, they hacked one of the Polish telecom operators and forged thousands of zloty invoices, allegedly in the name of a businessman and a private detective.

One of the most notorious cases occurred on June 26-27, 2019, when cybercriminals sent bomb threats to 1,066 kindergartens. As a result, 10,536 people were evacuated from 275 kindergartens throughout Poland.

Among other things, the group carried out attacks using ransomware and malware such as Cerberus, Anubis, Danabot, Netwire, Emotet and njRAT. The number of victims is in the thousands.

From the infected devices, hackers stole personal data, with the help of which they transferred money from bank accounts. If the bank used several authentication mechanisms, the attackers took the information stolen from the victims and ordered fake IDs on the darknet. With their help, they tricked mobile operators by forcing them to "bind" the victim's account to a new SIM card (a technique known as SIM swapping).

According to Polish media reports, using this technique, the group stole 199,000, 220,000 and 243,000 zlotys in three separate incidents. The hackers also tried to steal PLN 7.9 million from one of the victims, but the hacking was stopped when bank employees called the victim to confirm the transaction.
 
Ad End 1 November 2024
Top