Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims

Posted on August 28, 2025August 28, 2025 By CWS

South Korean authorities have efficiently extradited a Chinese language nationwide suspected of orchestrating one of the subtle hacking operations concentrating on high-profile people and monetary establishments.

The 34-year-old suspect, recognized solely as Mr. G, was repatriated from Bangkok, Thailand, on August 22, 2025, following a four-month worldwide manhunt that resulted in his arrest for allegedly stealing over 38 billion gained (roughly $28.5 million) from victims’ monetary and digital asset accounts.

The legal group, working from abroad places of work primarily in Thailand, executed a posh multi-vector assault marketing campaign spanning from August 2023 to January 2024.

The group’s major methodology concerned infiltrating cell service web sites and different net platforms to reap private info from rich people, celebrities, company executives, and enterprise firm representatives.

Utilizing this stolen information, the hackers gained unauthorized entry to victims’ banking accounts and cryptocurrency wallets, systematically transferring property with out detection for months.

Preliminary investigations revealed that the malware employed subtle social engineering methods mixed with technical exploitation of net software vulnerabilities.

Moj.go.kr analysts recognized the assault sample as a coordinated effort using each automated instruments and handbook intervention to maximise monetary extraction whereas avoiding conventional safety monitoring techniques.

Hacker obtained arrested (Supply – Moj.go.kr)

The operation’s technical sophistication turned obvious by way of its multi-stage an infection mechanism, which relied closely on exploiting vulnerabilities in cell service authentication techniques.

The malware initially gained entry by way of compromised net portals, the place attackers injected malicious scripts designed to reap person credentials and session tokens.

As soon as contained in the community perimeter, the malicious code established persistent backdoors utilizing encrypted communication channels to take care of long-term entry.

The persistence ways employed by this menace actor demonstrated superior information of system administration and community safety protocols.

The malware utilized a mix of registry modifications and scheduled activity creation to make sure steady operation throughout system reboots.

Code evaluation revealed using obfuscated PowerShell scripts that executed at common intervals, checking for community connectivity and updating command-and-control server addresses dynamically.

$encoded = [System.Convert]::FromBase64String($information)
$decoded = [System.Text.Encoding]::UTF8.GetString($encoded)
Invoke-Expression $decoded

Detection evasion mechanisms included the implementation of anti-analysis methods resembling atmosphere checking, sandbox detection, and runtime packing.

The malware persistently modified its file signatures and employed living-off-the-land methods, using legit system instruments like PowerShell and Home windows Administration Instrumentation to execute malicious actions whereas showing as regular system processes.

The profitable extradition represents a big victory for worldwide cybercrime cooperation, with Korean authorities working intently with Thai officers, Interpol, and the Southeast Asia Cooperation Community to trace and apprehend the suspect inside simply 4 months of his entry into Thailand.

Enhance your SOC and assist your crew shield your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Arrests, Chinese, Dollars, Hacker, Korea, Millions, South, Stolen, Suspected, Tens, Victims

Post navigation

Previous Post: Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names
Next Post: How to Understand Metadata in Shared Files

Related Posts

Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence Cyber Security News
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression Cyber Security News
Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Cyber Security News
Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cyber Security News
Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails Cyber Security News
10 Best Enterprise Remote Access Software Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark