DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The cyber police exposed an attacker in the sale of databases with personal data of citizens of Ukraine and the EU

Posted on April 28, 2023 by Dissent

Machine translation of a press release by the Ukrainian cyber police:

The illegal activities of a 36-year-old resident of Netishyn were exposed by the employees of the Cyber ​​Police Department together with the employees of the Svyatoshyn district prosecutor’s office.

The man was an administrator of closed groups and channels in the Telegram messenger, where he sold personal data of citizens of Ukraine and the European Union.

In particular, the attacker had information on passport data, tax payer numbers, birth certificates, driver’s licenses, and bank account data.

Photo of some of suspect's equipment and cabling.In total, the databases contained personal information of more than 300 million people, citizens of Ukraine and EU countries.

Depending on the amount of data, the person involved asked for them from 500 to 2000 dollars.

It was previously established that the buyers were also citizens of the aggressor country. The person involved received payment for the sale of databases to citizens of the Russian Federation using currencies prohibited on the territory of Ukraine.

Photo of suspect's desk with stacks of drives and an array of monitors.

As part of the pre-trial investigation of criminal proceedings under Part 2 of Art. 361-1 (Creation for the purpose of illegal use, distribution or sale of malicious software or technical means, as well as their distribution or sale), Art. 362 (Unauthorized actions with information that is processed in computers, automated systems, computer networks or stored on carriers of such information, committed by a person who has the right to access it) of the Criminal Code of Ukraine and on the basis of a court order, law enforcement officers came to the person involved to conduct a search.

The intruder obstructed the investigation, and later injured a cyber police officer. The figure was detained in accordance with Art. 208 of the Criminal Procedure Code of Ukraine and placed in a temporary detention facility.

Law enforcement officers searched the home of the intruder. Mobile phones, three dozen hard drives, SIM cards, computer equipment and server equipment were seized, on which cyber police officers found databases with limited access. The origin of these bases is currently being established.

In response to the attack on the cyber police officer, the investigators of the Shepetivskyi District Police Department started a pre-trial investigation under Part 2 of Art. 345 (Threat or violence against a law enforcement officer) of the Criminal Code of Ukraine. The sanction of the article provides for restriction of freedom for a term of up to five years or deprivation of liberty for the same term. Investigations are ongoing.

Read the original press release.

 

Category: MiscellaneousNon-U.S.

Post navigation

← Man Sentenced for Stealing Over 712 Bitcoin Subject to Forfeiture
TUSD’s Cyber Shutdown: District will need help, and millions of dollars, to rebound from ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.