DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Presumably the largest Dutch user of the Genesis Market arrested

Posted on July 26, 2023 by Dissent

Who knew that the Netherlands was such a hotbed of cybercrime? This week, the police reported:

Barendrecht – In the international investigation “Operation Cookie Monster”, a 32-year-old Dutchman who lives in Brazil was arrested after intensive investigation. This happened on Tuesday 18 July in Barendrecht. Because the man was in complete restraint after his arrest, his arrest could not be communicated earlier due to research interests. The suspect was brought before the examining magistrate on Monday 24 July. He has determined that he will be detained for two weeks longer.

The man was at the top of the list of suspects of the Rotterdam Cybercrime Team in the investigation into the Genesis Market. On the Genesis Market, the site that was taken offline by the FBI on April 4, millions of user profiles containing online fingerprints were sold. It allowed cybercriminals to take on someone’s online life. For example, it was possible to order and pay for things in web shops in the name of victims or, in certain cases, even to plunder entire bank, crypto or investment accounts.

Hundreds of searches were carried out worldwide at the beginning of April. In the Netherlands, 17 arrests were made and 23 searches were carried out. During the investigation, the 32-year-old man also came into the picture. He topped the list of Dutch suspects because he allegedly traded on a large scale at the Genesis Market. Ruben van Well of the Cybercrime team: “We suspect that this man has spent tens of thousands of euros on the market and is therefore the largest Dutch user of the Genesis Market and may even be among the top 10 largest users worldwide. We suspect the man of having duped a lot of people with his actions. There are reports of people who have been robbed for tens of thousands of euros. With the arrest of this suspect, we think we have made a major step in this investigation.

More arrests

Van Well: “After the site was taken offline, the users of the platform were already warned that more arrests would follow. Together with the FBI, we have a wealth of information about the buyers of the market. You always leave traces on the internet, even if you use a VPN and if payment is made via crytocurrency. The investigation is still in full swing and more arrests are not ruled out.’

Check your hack

On www.politie.nl/checkjehack, the police have made it possible to check whether your data has been offered on the Genesis Market. Since April 4, 4.4 million people have done the check. More than 11,800 people received an email that their computer was indeed infected.
“Normally, we always advise people in the event of identity fraud to immediately replace all their passwords. But this malware is structured in such a way that this alone does not help,’ says Van Well. ‘The criminal who has purchased your data will then simply receive an update of your new password. If you haven’t done the check yet, do it now.” Stressed Van Well. At https://www.politie.nl/onderwerpen/online-fingerprint-fraude.htmlyou can read more information about how to get the malicious software off your computer and how you can protect yourself even better online.

h/t, Risky Biz News

Related posts:

  • 10 Australians arrested as part of international illegal marketplace takedown
  • I had been chatting with a blackhat. They had been working with a whitehat. We were both dealing with the same person.
Category: Non-U.S.

Post navigation

← NL: Investigation into arms trade leads to suspected cybercriminal
Group-IB founder Ilya Sachkov sentenced to 14 years in prison for high treason →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.