DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Dangerous hacker responsible for more than 40 cyberattacks on strategic organizations arrested (1)

Posted on February 5, 2025February 6, 2025 by Dissent

Joint operation of the National Police and the Civil Guard  press release:

The suspect, who claimed responsibility for the intrusions into dark web forums, managed to access the computer services of public and private entities, including the Civil Guard, the Ministry of Defense, the National Mint and Stamp Factory, the Ministry of Education, Vocational Training and Sports, the Generalitat Valenciana, various Spanish universities, databases of NATO and the US Army, as well as other international companies and entities.

During the search, the agents have seized cryptocurrencies and various computer material which is being analyzed by specialists, who do not rule out the clarification of other criminal acts.

February 5, 2025. National Police.

05/02/25.   Watch the video on the National Police’s X.com account.

Agents of the National Police, in a joint operation with the Civil Guard, arrested, last Tuesday in the town of Calpe (Alicante), a person for his alleged participation in the crimes of discovery and disclosure of secrets, illegal access to computer systems, computer damage and money laundering.

The detainee carried out multiple attacks on the IT services of national and international companies and entities, including public services and government agencies. He also claimed responsibility for the attacks on dark web forums under different pseudonyms to avoid being identified and linked to the criminal acts.

During the search of his home, multiple computer equipment was seized, which is being analysed by specialists and other similar events are not ruled out. In addition, the detainee had more than 50 cryptocurrency accounts with different types of cryptoassets, a significant fact of the extensive knowledge that the arrested man has of the blockchain world.

He changed his pseudonym frequently to avoid detection.

Following these events, and during 2024, various cyberattacks against other entities, public bodies and even Spanish universities took place. Subsequently, and using up to three different pseudonyms, he attacked international bodies and government-type organisations by accessing databases with personal information of employees and clients, as well as internal documents that were subsequently sold or freely published on forums.

Cyberattacks carried out against important institutions

The National Police began the investigation in February of last year following a complaint from a Madrid business association after detecting a post on a forum specialising in data leaks, where they claimed to be in possession of information from their website. After carrying out the first steps, the agents found that not only had data been extracted, but the portal had been defaced, displaying a message in which it could be read that the system had been hacked.

Following these events, and throughout 2024, the investigated actor carried out numerous cyberattacks, including the attack on the National Mint and Stamp Factory, the State Public Employment Service, the Ministry of Education, Vocational Training and Sports, various Spanish universities, as well as databases of NATO, the United States Army, the General Directorate of Traffic, the Generalitat Valenciana, the United Nations, the International Civil Aviation Organization, and his latest claimed attack, two databases of the Civil Guard and the Ministry of Defense.

This latest attack, carried out at the end of December 2024, led the Central Operational Unit of the Civil Guard to carry out an investigation and identify the same target as the perpetrator, with the operational exploitation being carried out jointly by both police forces.

Measures to hide navigation trails during attacks

The suspect, who had extensive knowledge of computers, had managed to set up a complex technological network through the use of anonymous messaging and browsing applications, through which he had managed to hide his tracks and thus make his identification difficult.

The operation, which was carried out jointly by agents of the National Police and the Civil Guard, had the decisive collaboration of the National Cryptologic Centre (CCN) of the National Intelligence Centre (CNI).

At the international level, there has been collaboration with EUROPOL and the Homeland Security Investigations (HSI) of the USA.

Update: See also Bleeping Computer’s coverage, as they identify the young hacker as having used the moniker “natohub” on BreachForums. That account has now been banned on BreachForums because “he can be fedded.”  A post on BreachForums today called “LOCK4J (NATOHUB) ARRESTED BY THE SPANISH NATIONAL POLICE AND THE CIVIL GUARD” appears to have come under the control of law enforcement and claims:

Hi BF
The threat actor who controlled this profile lock4j (aka natohub / m1000 / dsf / gpt / skibiditoilet69) has been arrested in Alicante (SPAIN) by the Spanish National Police and the Civil Guard. Now, he will have to face justice for the cyberattacks carried out. 

The acts promoted in this forum are being investigated by law enforcement agencies, and engaging in them carries legal consequences. Law Enforcement Agencies worldwide work together in the pursuit of these activities.

 


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
  • Qantas obtains injunction to prevent hacked data’s release
  • North Country Healthcare responds to Stormous's claims of a breach
Category: Hack

Post navigation

← A 25-Year-Old With Elon Musk Ties Has Direct Access to the Federal Payment System
Hackers target Taliban databases →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.