Four European Hackers Arrested in $16 Million Phobos Ransomware Scheme

Thai police arrest four European hackers involved in a $16 million ransomware scheme using Phobos malware, targeting Swiss companies.

In a significant breakthrough against cybercrime, Thai police have arrested four European hackers in Phuket, accused of orchestrating a series of ransomware attacks that resulted in a staggering $16 million theft. The suspects, wanted by authorities in Switzerland and the United States, were apprehended during a coordinated operation across multiple locations on the island.

Key Takeaways

  • Four hackers arrested in Phuket for $16 million ransomware theft.
  • Suspects were wanted by Swiss and US authorities.
  • Operation led by Thailand's Cyber Crime Investigation Bureau.
  • Group used Phobos ransomware to target Swiss companies.
  • Over 1,000 victims affected globally.

Operation Phobos Aetor

The operation, dubbed "Operation PHOBOS AETOR," was executed by the Cyber Crime Investigation Bureau, under the leadership of Lieutenant General Trairong Phiwphan. The police collaborated with immigration and regional police forces to carry out the arrests. During the raids, authorities seized more than 40 electronic devices, including mobile phones, laptops, and digital wallets, which are believed to contain crucial evidence related to the cybercrimes.

The suspects, comprising two men and two women, face serious charges, including conspiracy to commit crimes against the United States and conspiracy to commit wire fraud. Their arrest was made possible through international cooperation, with warrants issued by Interpol.

The Phobos Ransomware Attacks

The Phobos ransomware gang is accused of targeting 17 Swiss companies between April 30, 2023, and October 26, 2024. The hackers gained unauthorized access to the victims' networks, encrypting files and stealing sensitive data. They demanded ransoms in cryptocurrency, threatening to publish the stolen information if their demands were not met.

To obscure the trail of their illicit gains, the group employed cryptocurrency mixing services, complicating efforts to trace the funds. The total damages from their operations are estimated to be around $16 million, affecting over 1,000 victims worldwide.

Understanding Phobos Ransomware

Phobos ransomware is a variant of malware that encrypts files on infected systems, demanding a ransom for their recovery. It is derived from the Dharma ransomware and shares many of its characteristics, but it has unique methods of spreading and customizing ransom demands.

Key features of Phobos ransomware include:

  • Exploitation of RDP Connections: The malware primarily spreads by exploiting exposed Remote Desktop Protocol (RDP) connections, often using weak or compromised credentials.
  • File Encryption: Once activated, it encrypts files by appending a unique extension that includes the attackers' contact information.
  • Ransom Notes: Victims receive a ransom note with instructions on how to pay, typically in Bitcoin or other cryptocurrencies, with demands that can reach thousands of dollars.

Currently, there are no publicly available tools for free decryption of files affected by Phobos ransomware. Therefore, prevention is crucial, involving measures such as securing remote access, using strong passwords, regularly updating systems, and maintaining offline backups to mitigate data loss.

Conclusion

The arrest of the Phobos ransomware gang marks a significant victory in the ongoing battle against cybercrime. As authorities continue to investigate, the case highlights the importance of international cooperation in tackling transnational criminal organizations and the need for robust cybersecurity measures to protect against such threats.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Exploring the Future: How Web 3 Protocols are Revolutionizing the Internet
22.2.2025
[ Featured ]

Exploring the Future: How Web 3 Protocols are Revolutionizing the Internet

Discover how Web 3 protocols are transforming the internet with decentralization and user empowerment.
Read article
Web3 Security: From Manual to AI-Powered Protection
22.2.2025
[ Featured ]

Web3 Security: From Manual to AI-Powered Protection

Explore AI-driven solutions enhancing Web3 security, from audits to real-time threat detection and user protection.
Read article
Harnessing the Future: Innovative AI-Driven Blockchain Solutions for Businesses in 2025
22.2.2025
[ Featured ]

Harnessing the Future: Innovative AI-Driven Blockchain Solutions for Businesses in 2025

Explore AI-driven blockchain solutions revolutionizing industries with security, scalability, and innovation in 2025.
Read article