Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims

Posted on August 28, 2025August 28, 2025 By CWS

South Korean authorities have efficiently extradited a Chinese language nationwide suspected of orchestrating one of the subtle hacking operations concentrating on high-profile people and monetary establishments.

The 34-year-old suspect, recognized solely as Mr. G, was repatriated from Bangkok, Thailand, on August 22, 2025, following a four-month worldwide manhunt that resulted in his arrest for allegedly stealing over 38 billion gained (roughly $28.5 million) from victims’ monetary and digital asset accounts.

The legal group, working from abroad places of work primarily in Thailand, executed a posh multi-vector assault marketing campaign spanning from August 2023 to January 2024.

The group’s major methodology concerned infiltrating cell service web sites and different net platforms to reap private info from rich people, celebrities, company executives, and enterprise firm representatives.

Utilizing this stolen information, the hackers gained unauthorized entry to victims’ banking accounts and cryptocurrency wallets, systematically transferring property with out detection for months.

Preliminary investigations revealed that the malware employed subtle social engineering methods mixed with technical exploitation of net software vulnerabilities.

Moj.go.kr analysts recognized the assault sample as a coordinated effort using each automated instruments and handbook intervention to maximise monetary extraction whereas avoiding conventional safety monitoring techniques.

Hacker obtained arrested (Supply – Moj.go.kr)

The operation’s technical sophistication turned obvious by way of its multi-stage an infection mechanism, which relied closely on exploiting vulnerabilities in cell service authentication techniques.

The malware initially gained entry by way of compromised net portals, the place attackers injected malicious scripts designed to reap person credentials and session tokens.

As soon as contained in the community perimeter, the malicious code established persistent backdoors utilizing encrypted communication channels to take care of long-term entry.

The persistence ways employed by this menace actor demonstrated superior information of system administration and community safety protocols.

The malware utilized a mix of registry modifications and scheduled activity creation to make sure steady operation throughout system reboots.

Code evaluation revealed using obfuscated PowerShell scripts that executed at common intervals, checking for community connectivity and updating command-and-control server addresses dynamically.

$encoded = [System.Convert]::FromBase64String($information)
$decoded = [System.Text.Encoding]::UTF8.GetString($encoded)
Invoke-Expression $decoded

Detection evasion mechanisms included the implementation of anti-analysis methods resembling atmosphere checking, sandbox detection, and runtime packing.

The malware persistently modified its file signatures and employed living-off-the-land methods, using legit system instruments like PowerShell and Home windows Administration Instrumentation to execute malicious actions whereas showing as regular system processes.

The profitable extradition represents a big victory for worldwide cybercrime cooperation, with Korean authorities working intently with Thai officers, Interpol, and the Southeast Asia Cooperation Community to trace and apprehend the suspect inside simply 4 months of his entry into Thailand.

Enhance your SOC and assist your crew shield your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Arrests, Chinese, Dollars, Hacker, Korea, Millions, South, Stolen, Suspected, Tens, Victims

Post navigation

Previous Post: Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
Next Post: How to Understand Metadata in Shared Files

Related Posts

New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices Cyber Security News
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware Cyber Security News
APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task Cyber Security News
Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Metadata in Shared Files
  • South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware
  • Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Metadata in Shared Files
  • South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims
  • Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
  • Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware
  • Leveraging dMSAs for Credential Acquisition and Lateral Movement in Active Directory

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News