Nov 25, 2021
0 0

Ukraine arrests ‘Phoenix’ hackers behind Apple phishing attacks

Written by

Apple sues spyware-maker NSO Group, notifies iOS exploit targets
Over nine million Android devices infected by info-stealing trojan
Exploit released for Microsoft Exchange RCE bug, patch now
Malware now trying to exploit new Windows Installer zero-day
Windows 10 KB5007253 update released with network printing fixes
Black Friday Deal: Emsisoft Anti-malware on 3-devices for price of 1
Germany to force ISPs to give discounts for slow Internet speeds
Hackers exploit Microsoft MSHTML bug to steal Google, Instagram creds
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
The Security Service of Ukraine (SSU) has arrested five members of the international ‘Phoenix’ hacking group who specialize in the remote hacking of mobile devices.
The SSU’s announcement states that all five suspects live in Kyiv or Kharkiv and are higher technical education institutes graduates.
The goal of ‘Phoenix’ was to gain remote access to the accounts of mobile device users and then monetize them by hijacking their e-payment or bank accounts or selling their private information to third parties.
To steal mobile accounts of mobile device users, the actors used phishing sites that were clones of Apple’s and Samsung’s login portals.
This activity went on for at least two years, during which Phoenix hacked several hundred people’s accounts.
The hackers also offered remote mobile phone hacking services to others, charging between $100 and $200.
Finally, the group was also unlocking stolen or lost devices made by Apple, tied to the original purchaser by locking them to the first account created on the device.
The police have conducted five searches in each arrest location, seizing computer equipment, mobile phones, specialized software, and hardware.
While conducting searches of homes and fake telephone shops, officers found several devices that appeared to have been stolen and were being prepared for reselling as new in the Kyiv region.
The threat actors now face charges relevant to Article 361 of the Criminal Code of Ukraine for illegal interference in the work of electronic computers, systems, and computer networks.
While the five arrested individuals are most likely all the ‘Phoenix’ group members, the authorities will continue the investigations to potentially identify more conspirators.
Ukraine has been actively cracking down on cybercrime activity originating from their country, with recent arrests of ransomware membersmoney launderers, and threat actors behind DDoS attacks.
Ukrainian police arrest DDoS operator controlling 100,000 bots
The Week in Ransomware – October 8th 2021 – Making arrrests
Ransomware operators behind hundreds of attacks arrested in Ukraine
Apple sues spyware-maker NSO Group, notifies iOS exploit targets
Get 12 popular Mac apps for $18 with this limited edition bundle
Not a member yet? Register Now
Over nine million Android devices infected by info-stealing trojan
Malware now trying to exploit new Windows Installer zero-day
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


Article Categories:
Cybersecurity News

Comments are closed.