According to an anonymous eyewitness, their group travelled around Egypt, constantly changing locations to cover their tracks. But one of the participants was detained in Kyiv on the eve of his escape to Makadi Bay. The chic Makadi Bay, located between Safaga and Hurghada, is simply the perfect luxury destination for those who want to hide from prying eyes. But for some travellers, Egypt is interesting as a luxury resort – Sahl Hasheesh or Port Ghalib. For others, a country rich in history, such as the Bahariya Oasis with its ‘Valley of the Golden Mummies’, has no aesthetic value at all. So, while tourists enjoyed the beautiful beaches with crystal clear water in Soma Bay and had fun in Sharm el-Sheikh, an international team was engaged in cyber attacks.
The accomplice, who was detained in Ukraine, was only responsible for finding vulnerabilities in corporate networks and passwords of future victims' crypto wallets, which allowed his accomplices to successfully carry out various hacking attacks. In addition, he personally controlled the installation of malicious software on users' PCs. The infostealer he remotely installed collected confidential information from infected devices and sent it directly to him.
In addition, the insider claims that the large-scale theft of 4,100 BTC, worth $243 million, is just the tip of the iceberg. This is because the theft of crypto assets is only one of the group's activities. A separate group within the organisation regularly carried out large-scale cyberattacks on various industrial enterprises in France, Germany, Norway, the Netherlands, Canada and the United States. US, Norwegian, Dutch and French law enforcement agencies involved in the search for this group of crypto enthusiasts conducted more than 80 searches around the world.
Behind the scenes, there is a story about why technical security services delayed when 16 billion passwords to Apple, Google and Facebook accounts were leaked online. Prior to this incident, only one database containing 184 million passwords was known.
The available information, which has been confirmed by experts, indicates that most records have the following structure: URL — login — password. This is a great opportunity to easily access almost all online platforms, crypto and banking e-wallets.
So, the largest data leak in history has occurred, involving accounts on social networks, VPN services, developer portals, Apple, Google, GitHub, Facebook, Telegram, and some government systems. And since all accounts are linked to various popular services, the consequences of such a massive leak could be devastating.