Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

Russia Arrests Meduza Stealer Developers After Government Hack – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Cyberinchief by Cyberinchief
November 1, 2025
Reading Time: 2 mins read
0
Russia Arrests Meduza Stealer Developers After Government Hack – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More


In a surprise raid on Thursday, October 30, 2025, Russian law enforcement detained three individuals suspected of creating and selling the malicious Meduza Stealer. The arrests took place in Moscow and the surrounding area, following an investigation from the Investigative Department of the Ministry of Internal Affairs of Russia, as confirmed by Irina Volk, spokesperson for Russia’s Interior Ministry.

Meduza Stealer’s Profile and Pricing

The suspects, described as ‘young IT specialists,’ allegedly ran Meduza as a profitable Malware-as-a-Service (MaaS) operation since mid-2023. This notorious C++-based program quickly became a powerful information stealer, capable of gathering sensitive data, including:

  • Login Credentials: Passwords and session tokens from over 100 browsers and 27 password managers.
  • Cryptocurrency: Data from over 100 wallets, including browser-based extensions.
  • Messaging/Gaming: Information stolen from Telegram IM and Steam clients.

The malware was actively sold on underground forums and Telegram channels. Subscription pricing for the latest version, Meduza 2.2, was set at $199 per month, with a lifetime membership costing $1,199. It was also highly sophisticated, using the ChaCha20 algorithm for payload encryption and anti-VM features to bypass security analysis.

Investigation Details- The Critical Error

The investigation’s key turning point was the group’s alleged decision to breach a Russian government organisation in the Astrakhan region earlier this year and steal classified data. This attack was perhaps a fatal error because Meduza Stealer was specifically designed with a geo-filter to avoid targets in Russia, Kazakhstan, and Belarus, a critical operational security (OpSec) rule among local cybercriminals to maintain an implicit shield from authorities.

The Dramatic Crackdown

Police seized computer equipment, phones, and bank cards during the raids. The Video footage of the operation, conducted with the support of Rosgvardia forces, shows officers storming multiple apartments, and one suspect is filmed wearing ‘Hello Kitty’ pajama pants

“Three defendants have chosen various preventive measures. All accomplices and episodes of illegal activity are established,” said Volk.

RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

Investigators also discovered the group had developed a second, unidentified piece of malware designed to disable security defences and build botnets. If convicted on all charges, the three young specialists face a potential prison sentence of up to five years.

This arrest signals a clear and consequential change in Moscow’s stance. According to a recent report from Recorded Future’s Insikt Group, Russia’s strategy toward the local hacking scene is moving from passive tolerance to active management.

These arrests validate the finding that Russia is using selective arrests and public crackdowns to assert state authority and target domestic hackers who become too visible or politically inconvenient.





Source link

Buy JNews
ADVERTISEMENT
Tags: ArrestsBreachescryptocybersecuritydataDevelopersGovernmenthackHackreadMeduzaNewsRussiaStealertech
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
are you interested in cybersecurity

are you interested in cybersecurity

Chiranjeevi Files Cyber Crime Complaint | Trendsetter Telugu

Chiranjeevi Files Cyber Crime Complaint | Trendsetter Telugu

Recommended Stories

Computer Class-7| Networking and Cyber Security

Computer Class-7| Networking and Cyber Security

November 1, 2025
Poland detains Russian citizen suspected of hacking local firms

Poland detains Russian citizen suspected of hacking local firms

November 28, 2025
Different Roles in Cybersecurity | Cybersecurity Roadmap 2025 | Certifications, Salary | Tutedude

Different Roles in Cybersecurity | Cybersecurity Roadmap 2025 | Certifications, Salary | Tutedude

November 22, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested