DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

United States authorities Arrest four Filipino hackers

Posted on November 25, 2011 by Lee J

PHILIPPINES and United States authorities arrested Wednesday four members of a Filipino hackers group whose operation is allegedly being financed by a Saudi Arabia-based terrorist group. Wednesday night’s operation stemmed from the complaint of AT&T, a US-based telecommunication company and the Federal Bureau of Investigation (FBI) regarding the activities of Filipino hackers who hacked the system of AT&T. The hacking activity resulted in about US$2-million in losses incurred by the company, said Criminal Investigation and Detection Group (DILG) Director Samuel Pagdilao Jr. Pagdilao said operatives from the CIDG’s Anti-Transnational and Cyber Crime Division (ATCCD) and FBI agents struck at several target areas in Metro Manila, resulting in the arrest of four suspects. Several computer and telecommunication equipment believed to be used by the suspects in their hacking activities were recovered. ATCCD chief Gilbert Sosa identified the arrested suspects as Macnell Gracilla, 31, of Carmen Rosales, Pangasinan and resident of Unit 5, Montiville Place, Greenville Subdivision, Sauyo, Quezon City; Francisco Manalac, 25, and his live-in partner Regina Balura, 21, both of 89 Sampaguita Extension, East Bagong Barrio, Calooocan City; and Paul Michael Kwan, 29, of 21 Hebrew St., West Bagong Barrio, Caloocan City. Sosa said that prior to Wednesday’s arrest of Kwan, the suspect has been arrested in 2007 by Philippine authorities following the international crackdown launched by the FBI against suspected terrorist cells involved in financing terrorist activities. Sosa said FBI agents who have been investigating incessant hacking of telecommunication companies in the US and in the country since 1999 have uncovered paper trail of various bank transactions linking the local hackers to the Saudi-based cell whose activities include financing terrorist activities. Sosa said that in 2007, FBI operatives arrested Pakistani Jemaah Islamiyah member Muhammad Zamir in Italy. Zamir’s group, who was later tagged by the FBI to be the financial source of the terrorist attack in Mubai, India in November 26, 2008, is also the same group that paid Kwan’s group of hackers in Manila. Sosa said Kwan and the other hackers in Manila were being used by the Zamir’s terrorists group to hack the trunk-line of different telecommunication companies including the AT&T. Revenues derived from the hacking activities of the Filipino-based hackers were diverted to the account of the terrorists, who paid the Filipino hackers on a commission basis via local banks. After Zamir’s arrest in 2007, a Saudi-national took helm of the operation of the group, who also maintained its link with the group of Filipino hackers based in Manila. On March 2011, FBI authorities requested the CIDG-ATCCD assistance after they found out that the group has targeted the AT&T in the US and that the same group of Filipino hackers is involved. Pagdilao said the recent arrest of Filipino hackers tied to a group involved in financing terrorist activities should serve as a wake-up call to legislators to speed-up the passage of the Cyber Crime Prevention Bill now pending in Congress in order to address proactively the threat of cyber crime terrorists who have made the country their base of operations. (VR/Sunnex)

No related posts.

Category: Breach Incidents

Post navigation

← Milton Keynes arrested for News of the world hacks
Data theft results in court battle →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.