DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

4 Hackers Arrested in Poland in Nation-Wide Action Against Cybercrime

Posted on September 25, 2020 by Dissent

Today, the Polish authorities are announcing the arrest of 4 suspected hackers as part of a coordinated strike against cybercrime. Those arrested are believed to be among the most active cybercriminals in the country.

This operation was carried out by the Polish Police Centre Bureau of Investigation (Centralne Biuro Śledecze Policji) under the supervision of the Regional Prosecutor’s Office in Warsaw (Prokuratura Regionalna w Warszawie), together with the cybercrime departments of provincial police headquarters and Europol.

These 4 suspects are believed to be involved in a wide variety of cybercrimes, including:

  • Malware distribution: investigators established that two of the suspects were involved in the distribution of malware, such as Remote Access Tools (RAT) and mobile malware. The malware was distributed through phishing emails impersonating government institutions. Over 1 000 people across Poland are believed to have fallen victim to this particular scam.
  • SIM swapping: The criminals stole personal data, including bank account credentials, from computers and phones infected with malware previously deployed on victims’ devices. They would then use the stolen data to dupe the victims’ mobile phone operators into porting the victims’ phone numbers to other SIM cards in the possession of these individuals. From that moment on, the criminals would receive all incoming calls and text messages, including one-time banking passwords which they used to transfer money out of the victims’ bank accounts into the accounts of money mules or cryptocurrency exchange platforms. Using such a technique, the criminals were able to steal over €147 000 (PLN 662 000) from their victims’ bank accounts.
  • E-commerce fraud: one of the criminals under investigation was also running 50 fake online shops and is believed to have defrauded approximately 10,000 people. A number of these fake e-commerce websites were also used to distribute malware.

Two of those arrested were also behind a series of bomb threats sent to kindergartens across the country, prompting the evacuation of 13 350 people.

Europol’s European Cybercrime Centre (EC3) supported the Polish authorities with operational analysis in order to identify the main targets and inform the overall strategy.

Source: Europol

Related posts:

  • AlphaBay and Hansa taken down in coordinated operations by FBI and Dutch National Police
Category: Non-U.S.Of Note

Post navigation

← Fallout From The Ransomware Attack At Illinois Valley Community College Is Still Far From Over
Legal action underway over University of Cumbria data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 70% of healthcare cyberattacks result in delayed patient care, report finds
  • Police disrupt “Diskstation” ransomware gang attacking NAS devices
  • Meta fixes bug that could leak users’ AI prompts and generated content
  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Upstate NY county clerk again refuses to enforce Texas abortion judgment
  • Attorney General James Leads Coalition Urging Congress to Protect Americans from Masked ICE Agents
  • Attorney General Tong Announces $85,000 Settlement with TicketNetwork for Violations of the Connecticut Data Privacy Act​
  • Fourth Circuit upholds West Virginia ban on abortion pills
  • Meta fixes bug that could leak users’ AI prompts and generated content
  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.