{"id":33385,"date":"2020-12-15T11:35:20","date_gmt":"2020-12-15T09:35:20","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=33385"},"modified":"2025-08-28T13:34:52","modified_gmt":"2025-08-28T10:34:52","slug":"hackers-who-stole-20-million-rubles-from-russians-bank-cards-arrested-funds-moved-into-cryptocurrencies","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/hackers-who-stole-20-million-rubles-from-russians-bank-cards-arrested-funds-moved-into-cryptocurrencies\/","title":{"rendered":"Hackers who stole 20 million rubles from Russians&#8217; bank cards arrested; funds moved into cryptocurrencies"},"content":{"rendered":"<p><span style=\\\"font-weight: 400;\\\">Law enforcement in Chuvashia identified hackers who, over five years, stole more than 20 million rubles from customers of Russian banks. The hackers converted the stolen funds into cryptocurrencies, according to <\/span><a href=\\\"https:\/\/ria.ru\/20201214\/khakery-1589180719.html\\\" target=\\\"_blank\\\" rel=\\\"noopener noreferrer\\\"><span style=\\\"font-weight: 400;\\\">RIA Novosti<\/span><\/a><span style=\\\"font-weight: 400;\\\">.<\/span><!--more--><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">For the theft of funds, hackers used the FakeToken malware. Their attacks targeted Android users. Using the malware, attackers intercepted SMS messages from banks and collected card data, and then transferred money from victims&#8217; accounts.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">Over the past five years, hackers gained access to more than 5,000 phones and data from at least 2,500 bank cards, BI.ZONE said, the cybersecurity company that assisted law enforcement in the investigation.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">The Interior Ministry arrested the alleged organizer and two members of the criminal group. During questioning, they admitted that they had been operating since 2015.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">During searches at the home of one of the suspects, law enforcement officers found devices confirming the use of FakeToken, as well as SIM cards from various telecom operators and Telegram correspondence confirming the suspect&#8217;s involvement in illegal activity.<\/span><\/p>\n<p>\\n<\/p>\n<p><span style=\\\"font-weight: 400;\\\">In October, Moscow police detained suspects in organizing a call centre, whose employees <a href=\"https:\/\/u1f987.com\/en\/news\/in-moscow-13-call-centre-staff-arrested-for-laundering-money-through-cryptocurrency\"><span style=\\\"font-weight: 400;\\\">stole money from citizens&#8217; bank accounts<\/span><\/a><span style=\\\"font-weight: 400;\\\"> and transferred part of the stolen funds into cryptocurrencies.<\/span><\/p>\n<p>\\n<\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\\\"https:\/\/t.me\/forklogfeed\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">ForkLog Feed<\/a> \u2014 full news feed, <a href=\\\"https:\/\/telegram.me\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Law enforcement in Chuvashia identified hackers who, over five years, stole more than 20 million rubles from customers of Russian banks. The criminals converted the stolen funds into cryptocurrencies, according to RIA Novosti.<\/p>\n","protected":false},"author":1,"featured_media":33386,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,27],"class_list":["post-33385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-russia"],"aioseo_notices":[],"amp_enabled":true,"views":"10","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/33385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=33385"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/33385\/revisions"}],"predecessor-version":[{"id":33387,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/33385\/revisions\/33387"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/33386"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=33385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=33385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=33385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}