The Ukrainian cyberpolice, working at the side of U.S. legislation enforcement, has recognized an 18-year-old man from Odesa suspected of operating an infostealer malware operation concentrating on customers of a web based retailer in California.
In response to the Ukrainian police, the menace actor used information-stealing malware between 2024 and 2025 to contaminate customers’ units and steal browser classes and account credentials.
Infostealers are a preferred sort of malware that harvests delicate knowledge, together with passwords, browser cookies, session tokens, crypto wallets, and fee data, from contaminated units and sends it to cybercriminals for account theft, fraud, and resale.
The assaults linked to the younger hacker impacted 28,000 buyer accounts, of which the cybercriminals used 5,800 to make unauthorized purchases totaling about $721,000. The malicious operation brought about $250,000 in direct losses, together with chargebacks.
“To hold out the felony scheme, the attackers used ‘infostealer’ malware that secretly contaminated customers’ units, collected login credentials, and transmitted them to servers managed by the attackers,” the police says.
“The data was then processed and offered by specialised on-line assets and Telegram bots.”
The police say the suspect engaged in cryptocurrency transactions together with his accomplices.

Supply:Â cyberpolice.gov.ua
The “session knowledge” talked about within the police announcement refers to session tokens that can be utilized to log in to the sufferer’s account with no need credentials and, in some instances, bypass multi-factor authentication (MFA) checks as properly.
The 18-year-old suspect administered the web infrastructure used to course of, promote, and make the most of the stolen session knowledge, the police said, indicating that he held a central function within the operation.
The police performed two searches on the suspect’s residences and seized cell phones, pc tools, financial institution playing cards, digital storage media, and different digital proof that verify his involvement within the unlawful operation.
Proof consists of entry to assets used to promote stolen knowledge and to handle compromised accounts, server exercise logs, and accounts on cryptocurrency exchanges.

Supply:Â cyberpolice.gov.ua
At this stage, authorities have recognized the suspect, performed searches, and seized units and different proof allegedly linking him to the operation.
Nonetheless, the announcement doesn’t point out an arrest, suggesting that investigators should still be constructing the case earlier than formally charging him.
Automated pentesting instruments ship actual worth, however they have been constructed to reply one query: can an attacker transfer by the community? They weren’t constructed to check whether or not your controls block threats, your detection guidelines fireplace, or your cloud configs maintain.
This information covers the 6 surfaces you truly have to validate.

