Cybercrime
,.
Fraud Management & Cybercrime
Man Accused of Hacking 90 Organizations Globally Under a Variety of Aliases

Thai police arrested a suspected hacker extortionist tied to more than 90 global data breaches.
See Also: Top 10 Technical Predictions for 2025
.
.
The suspect, that has actually not been called, is implicated of carrying out 65 information violations in the Asia-Pacific area alone. The Royal Thai Police worked together with the Singapore Police Force to recognize and restrain the 39-year-old male on Wednesday.
.
.
“The threat actor is suspected to have exploited vulnerabilities in the victims’ networks before stealing the victims’ data,” theSingapore Police Force stated in a declaration dispersed tolocal press “The threat actor is also suspected to have published the stolen data for sale online when victims failed to pay the ransom demanded.”
.
Police stated they took laptop computers, cellphones, deluxe products and automobiles worth greater than $300,000.
.
.
The suspicious run under a range of on-line characters, consisting of “Altdos,” which concentrated onSoutheast Asia Other pen names consisted of “Desorden,” “Ghostr” and “0mid16B,” and were associated with strikes around the world.
.
.
Singapore -based cybersecurity company Group- IB, which helped the examination, described the suspect as being “one of the most active cybercriminals in the Asia-Pacific since 2021, selling more than 13 terabytes of personal data on the dark web.”
.
.
Group- IB stated the suspect’s choice to transform pen names was an evident effort to make his initiatives harder to map. The company stated it assisted authorities link the different pen names to the solitary suspect by “linking his activities through writing styles, posting patterns and account timelines despite bans for scamming and multi-accounting.”
.
.(* ), the suspicious apparently concentrated on targeting
As Altdos companies prior to broadening the emphasis to Thai, Singapore and various other Bangladesh-Asia countries. Pacific authorities stated the opponent occasionally likewise made use of dispersed denial-of-service strikes versus sufferers The Singapore
.
.(* ), the opponent is presumed of striking a significant “to disrupt operational services and to remind them to pay the ransom.”
resort chain, additional targets in
As Desorden, in addition to Thai procedures in Singapore andAcer’s Taiwan opponent routinely published examples of taken information on the RaidForums cybercrime online forum to advertise strikes and stress sufferers right into paying.India
.
.The year, an aggressor utilizing the pen names GhostR declared on the cybercrime online forum
Online forums to have actually taken greater than 34 gigabytes of information coming from
Last- based telecommunications business Breach PTE and 846 gigabytes of information from Singapore logistics businessAbsolute Telecom Australian opponent likewise declared to have actually taken 5.3 million documents from a significant Victorian Freight Specialists testing data source kept by the The including info on terrorists, possible bad guys and risky people.British
.London Stock Exchange Group opponent typically got remote accessibility to systems using SQL shot strikes, utilizing such devices as sqlmap, in addition to by targeting badly protected remote desktop computer procedure web servers,
– IB stated.
The
.
.Group opponent normally
some instances, the opponent likewise secured data sources to include stress on sufferers to pay.
The
.
. “deployed a cracked version of Cobalt Strike to control compromised servers, exfiltrated data to rented cloud servers for blackmail, and leveraged direct customer notifications, media leaks and regulatory reports to pressure victims.” In stated
, CHIEF EXECUTIVE OFFICER of
“This case highlights the evolution of cybercriminal tactics, not just through technical exploits but through coercion, intimidation and reputational threats,” – IB.
Dmitry Volkov.