DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

United States authorities Arrest four Filipino hackers

Posted on November 25, 2011 by Lee J

PHILIPPINES and United States authorities arrested Wednesday four members of a Filipino hackers group whose operation is allegedly being financed by a Saudi Arabia-based terrorist group. Wednesday night’s operation stemmed from the complaint of AT&T, a US-based telecommunication company and the Federal Bureau of Investigation (FBI) regarding the activities of Filipino hackers who hacked the system of AT&T. The hacking activity resulted in about US$2-million in losses incurred by the company, said Criminal Investigation and Detection Group (DILG) Director Samuel Pagdilao Jr. Pagdilao said operatives from the CIDG’s Anti-Transnational and Cyber Crime Division (ATCCD) and FBI agents struck at several target areas in Metro Manila, resulting in the arrest of four suspects. Several computer and telecommunication equipment believed to be used by the suspects in their hacking activities were recovered. ATCCD chief Gilbert Sosa identified the arrested suspects as Macnell Gracilla, 31, of Carmen Rosales, Pangasinan and resident of Unit 5, Montiville Place, Greenville Subdivision, Sauyo, Quezon City; Francisco Manalac, 25, and his live-in partner Regina Balura, 21, both of 89 Sampaguita Extension, East Bagong Barrio, Calooocan City; and Paul Michael Kwan, 29, of 21 Hebrew St., West Bagong Barrio, Caloocan City. Sosa said that prior to Wednesday’s arrest of Kwan, the suspect has been arrested in 2007 by Philippine authorities following the international crackdown launched by the FBI against suspected terrorist cells involved in financing terrorist activities. Sosa said FBI agents who have been investigating incessant hacking of telecommunication companies in the US and in the country since 1999 have uncovered paper trail of various bank transactions linking the local hackers to the Saudi-based cell whose activities include financing terrorist activities. Sosa said that in 2007, FBI operatives arrested Pakistani Jemaah Islamiyah member Muhammad Zamir in Italy. Zamir’s group, who was later tagged by the FBI to be the financial source of the terrorist attack in Mubai, India in November 26, 2008, is also the same group that paid Kwan’s group of hackers in Manila. Sosa said Kwan and the other hackers in Manila were being used by the Zamir’s terrorists group to hack the trunk-line of different telecommunication companies including the AT&T. Revenues derived from the hacking activities of the Filipino-based hackers were diverted to the account of the terrorists, who paid the Filipino hackers on a commission basis via local banks. After Zamir’s arrest in 2007, a Saudi-national took helm of the operation of the group, who also maintained its link with the group of Filipino hackers based in Manila. On March 2011, FBI authorities requested the CIDG-ATCCD assistance after they found out that the group has targeted the AT&T in the US and that the same group of Filipino hackers is involved. Pagdilao said the recent arrest of Filipino hackers tied to a group involved in financing terrorist activities should serve as a wake-up call to legislators to speed-up the passage of the Cyber Crime Prevention Bill now pending in Congress in order to address proactively the threat of cyber crime terrorists who have made the country their base of operations. (VR/Sunnex)

Category: Breach Incidents

Post navigation

← Milton Keynes arrested for News of the world hacks
Data theft results in court battle →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.