18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses

Published 4 min de lectura 12 reading

The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly administered from Odessa by an 18-year-old young man and affected customers of a California online store during 2024-2025. According to the official communiqué, the campaign committed to 28,000 of which the criminals used 5,800 for unauthorized purchases for an approximate value of $721,000, with direct losses and contracargos estimated at $250,000. The police record seized records, equipment and cards, and also point out that the stolen data were processed and sold through online resources and Telegram bots, while payments and profit-sharing went in part through transactions in cryptomonedas ( communiqué of the Ukrainian Cyber Police).

The term infostealer brings together malicious programs designed to extract sensitive information from the infected device: passwords, browser cookies, session tokens, cryptomoneda portfolios and payment data. This digital commodity has a high demand in clandestine markets because it allows the of accounts without breaking passwords or, in many cases, without skipping multiple authentication controls if the attacker manages to steal session tokens. To understand what these malware families do and how they exploit, there are good technical and mitigation references in the sector: for example, analysis of infostealers from security providers such as Kaspersky explain their usual capabilities and vectors.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
Image generated with IA.

This case has several practical and strategic implications. In technical terms it reveals the effectiveness of organized operations that combine commercialized malware, automatic sales platforms (bots and panels) and monetization flows in cryptomonedas; in judicial terms it shows the effectiveness - and also the complexity - of international cooperation between forensic teams and law enforcement; and in preventive terms it reopens the debate on exclusive confidence in passwords and certain types of MFA that can be eluded with stolen session tokens.

For people affected or at risk, immediate measures should focus on cutting down persistent access: changing passwords for long and unique ones, closing active sessions from account settings to force re-login, revoking approved tokens by applications and, if possible, migrating to robust MFA methods such as physical keys (FIDO2 / WebAuthn) that provide protection against theft of cookies and tokens. In addition, review bank movements and notify card issuers to activate anti-fraud controls or reissue cards if there are suspicious transactions.

For online shops and platforms that handle accounts and payments, the lesson is that user experience security is not just authentication technology. It is essential to implement abnormal behavior detection in early session and shopping (geolocation, browser footprint, purchase speed patterns), real-time risk controls, enhanced verification for critical changes in accounts and payment processes that combine 3D Secure with fraud analysis. It is also critical to use protection on endpoints and servers, network segmentation, complete log and sufficient retention for forensic analysis in case of an incident.

From the point of view of the investigation, the seizure of equipment, server activity records and accounts in cryptomoneda exchanges is the basis for rebuilding attack and monetization flows. However, the absence of an explicit mention of arrest in the public note suggests that judicial proceedings are still under way and that investigators are working to strengthen the chain of custody and evidence before making formal charges.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
Image generated with IA.

There is a socio-economic component that should not be ignored: the banalization of access to criminal tools and the early age of many operators show that stopping digital crime also goes through specialized education, legal professional opportunities and campaigns targeting young people, as well as repressive measures. The combination of malware "as service," automatic markets in Telegram and easy to convert profits into crypto makes traceability difficult, but does not make it impossible if there is international cooperation and good evidence preservation.

If you run an online store or provide identity services, prioritize the implementation of session controls, check session cookies with Secure and HttpOnly, reduce the life time of sensitive tokens, use token binding where possible and regularly audit administrative access. For users and security equipment, deploy updated EDR / antivirus, educate in phishing (most common infostealers input route) and review browser extension permissions are steps that reduce the risk of infection.

Finally, reporting incidents to and working with the competent authorities accelerates containment and recovery. Research such as this shows that the combination of forensic work, cross-border cooperation and prevention measures can deactivate stolen data markets and pursue those who monetize the crime, but the key remains to reduce the exploitable surface: fewer reused accounts, stronger login and a protection architecture that exceeds the only password barrier.

Coverage

Related

More news on the same subject.