Cybercrime
,.
Fraud Management & Cybercrime
Man Accused of Hacking 90 Organizations Globally Under a Variety of Aliases

Thai police arrested a suspected hacker extortionist tied to more than 90 global data breaches.
See Also: Top 10 Technical Predictions for 2025
.
.
The suspect, that has really not been known as, is implicated of finishing up 65 data violations within the Asia-Pacific space alone. The Royal Thai Police labored along with the Singapore Police Force to acknowledge and restrain the 39-year-old male on Wednesday.
.
.
“The threat actor is suspected to have exploited vulnerabilities in the victims’ networks before stealing the victims’ data,” theSingapore Police Force acknowledged in a declaration dispersed tolocal press “The threat actor is also suspected to have published the stolen data for sale online when victims failed to pay the ransom demanded.”
.
Police acknowledged they took laptop computer computer systems, cellphones, deluxe merchandise and cars price better than $300,000.
.
.
The suspicious run beneath a spread of on-line characters, consisting of “Altdos,” which concentrated onSoutheast Asia Other pen names consisted of “Desorden,” “Ghostr” and “0mid16B,” and had been related to strikes around the globe.
.
.
Singapore -based cybersecurity firm Group- IB, which helped the examination, described the suspect as being “one of the most active cybercriminals in the Asia-Pacific since 2021, selling more than 13 terabytes of personal data on the dark web.”
.
.
Group- IB acknowledged the suspect’s selection to remodel pen names was an evident effort to make his initiatives tougher to map. The firm acknowledged it assisted authorities hyperlink the totally different pen names to the solitary suspect by “linking his activities through writing styles, posting patterns and account timelines despite bans for scamming and multi-accounting.”
.
.(* ), the suspicious apparently focused on focusing on
As Altdos firms previous to broadening the emphasis to Thai, Singapore and varied different Bangladesh-Asia nations. Pacific authorities acknowledged the opponent sometimes likewise made use of dispersed denial-of-service strikes versus victims The Singapore
.
.(* ), the opponent is presumed of putting a major “to disrupt operational services and to remind them to pay the ransom.”
resort chain, further targets in
As Desorden, along with Thai procedures in Singapore andAcer’s Taiwan opponent routinely revealed examples of taken data on the RaidForums cybercrime on-line discussion board to promote strikes and stress victims proper into paying.India
.
.The yr, an aggressor using the pen names GhostR declared on the cybercrime on-line discussion board
Online boards to have really taken better than 34 gigabytes of data coming from
Last- primarily based telecommunications enterprise Breach PTE and 846 gigabytes of data from Singapore logistics businessAbsolute Telecom Australian opponent likewise declared to have really taken 5.3 million paperwork from a major Victorian Freight Specialists testing information supply stored by the The together with information on terrorists, potential dangerous guys and dangerous individuals.British
.London Stock Exchange Group opponent usually received distant accessibility to programs utilizing SQL shot strikes, using such gadgets as sqlmap, along with by focusing on badly protected distant desktop pc process net servers,
– IB acknowledged.
The
.
.Group opponent usually
some cases, the opponent likewise secured information sources to incorporate stress on victims to pay.
The
.
. “deployed a cracked version of Cobalt Strike to control compromised servers, exfiltrated data to rented cloud servers for blackmail, and leveraged direct customer notifications, media leaks and regulatory reports to pressure victims.” In acknowledged
, CHIEF EXECUTIVE OFFICER of
“This case highlights the evolution of cybercriminal tactics, not just through technical exploits but through coercion, intimidation and reputational threats,” – IB.
Dmitry Volkov.