Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Crime

Administrator of Major Dark Web Cybercrime Forum Arrested In Ukraine (france24.com) 43

alternative_right shares a report from France 24: A suspected administrator of a top Russian-language cybercrime forum, XSS.is, has been arrested in Ukraine with the help of French police and Europol, French prosecutors said on Wednesday. Industry experts describe XSS.is as one of the longest-running dark web forums. "On Tuesday July 22, a person suspected of being the administrator of the Russian-language cybercrime forum XSS.is was arrested as part of a criminal investigation opened by the Paris public prosecutor's office," Paris prosecutor Laure Beccuau said in a statement. "Active since 2013, this forum was one of the main hubs for global cybercrime. The forum also operated an encrypted Jabber messaging server, facilitating anonymous exchanges between cybercriminals."

"A judicial investigation was opened on November 9, 2021 on charges of complicity in attacks on an automated data processing system, organised extortion, and criminal conspiracy," Beccuau said. "The intercepted messages revealed numerous illicit activities related to cybercrime and ransomware, and established that they generated at least $7 million in profits."

Administrator of Major Dark Web Cybercrime Forum Arrested In Ukraine

Comments Filter:
  • by Anonymous Coward
    Its interesting that the administrator of a hacking network widely identified as pro-Russian was arrested in Ukraine.
    • by shm ( 235766 ) on Wednesday July 23, 2025 @10:01PM (#65541118)

      How is it interesting? Most Ukrainians speak Russian. Even Zelenskyy had to learn Ukrainian after he became president.

      Itâ(TM)s like being surprised that most Scottish people speak English.

      • It's like being surprised that most Scottish people speak English.

        Most Americans speak English too, but you don't see us trying to annex the USA.

      • by cusco ( 717999 )

        Actually the Once Great Z grew up speaking Russian at home, Ukrainian is his second language. (OK, it's a dialect, but Ukrainians pretend it's a different language.) English is his third.

        • Well, my little know-nothing-know-it-all russian bot, Ukrainian is a real language and not a dialect by every definition of the word "language" except the ones you dumbass bots are using. It even has 7 grammatical cases instead of 6 in Russian that lost its vocative centuries ago.

      • Why would he be in 'enemy/nazi' territory anyways?

    • by cusco ( 717999 )

      Don't you know? Anything seen as bad is required to be linked to Russia or China, or maybe North Korea. Ukraine is all sweetness and light, even their openly neo-Nazi units are now good guys.

  • by Sean Clifford ( 322444 ) on Thursday July 24, 2025 @04:13AM (#65541626) Journal

    It won't take long to convince her - or him - to be debriefed then cooperate. There are a few needs for an individual and huge dividends to the Ukraine...well, at least until this prisoner...er, perhaps an asset...comes down with a fatal case of Vx, leaping from a 15th floor balcony in despair, or shooting themselves in the back of the head a few times.

    ***/rant on/***

    Why can't people STFU and keep information like this out of the news? GI Joes, Crayon eaters, Squids, Coasties, Space Cadets, and Chair Force folks understand. Their dependent families understand. Veterans, spouses, and certain other professionals understand.

    If you're some dipshit Air Force Sergeant, who sends his brother a photo via Apple Messenger, embedded with GPS data, saying where you (and your unit, etc.) are located, you're a fucknut who needs to be investigated-interrogated by the OSI.

    ***/rant off/***

    • Why can't people STFU and keep information like this out of the news?

      You mean, keep the arrest itself out of the news?

      I don't particularly want to live in a society where the authorities can whisk someone away without a trace.

      • by gweihir ( 88907 )

        I don't particularly want to live in a society where the authorities can whisk someone away without a trace.

        Yep, same here. Obviously the person you answered too is not very smart.

  • I read the article .. the summary is the whole article. According to the article:
    LEO intercepted encrypted jabber messages.

    Sooo... how did they decrypt?
    Is this the same story as one last week where someone got control of DNS records in Germany and did a MITM on a jabber server?

    Unwritten, yet implied is, a cloud or service provider changed the DNS records at the behest of LEO... that is believable ... but... ... it's a stretch to believe anyone read OMEMO or PGP encrypted messages ... without the key, which,
    • They could have just got them from a compromised device. People good at exploiting bad security aren't necessarily good at security. Not to mention this guy might just be a glorified forum admin.

      • The article is thin on the details, and glossy to the point of not believable on the finer points. I don't find it informative.
        Ironically, though, for me, nothing seems to point to microsoft or cisco or vmware as the broken link... I find that interesting, as they are "the usual suspects", imho.

        Doesn't' OMEMO use the double ratchet? i.e if keys on devices were compromised, isn't that only good for ... a short period of time? The ratchet generates new keys for every new message or packet? So criminals aren't
      • by gweihir ( 88907 )

        They could have just got them from a compromised device. People good at exploiting bad security aren't necessarily good at security.

        Indeed. Defending IT is far, far harder than attacking it. That is the whole reason why we see so many attacks. A major part is that insecure and immature software is in widespread use.

        As to Jabber, that comes apparently from ever insecure Cisco. The authorities may just have used a bug a few days before it became public.

        • The authorities may just have used a bug a few days before it became public.

          You misspelled "government back door" ;)

          • by gweihir ( 88907 )

            In the case of Cisco, I was under the impression that the general consensus was that they have been doing "error seeding" to create government backdoors for a long time and that this does not need to be mentioned anymore at this time.

        • Hold on there. Jabber protocol itself is insecure, that is true. But it says the Law intercepted encrypted messages. Jabber clients I use support OMEMO. You know OMEMO is e2ee. I have to assume that if you are planning crimes, you're going to use encryption. I don't see anything about devices in the article. It's implied that it was the servers that were compromised by The Law. That was my read. Actually there is so much missing that we have to make assumptions just to make sense of it .

          For once I do not se
          • by gweihir ( 88907 )

            I have followed cryptography research for about 40 years and I have never heard of "OMEMO". Cannot be a significant thing.

            • Seriously?
              https://en.wikipedia.org/wiki/OMEMO

              OMEMO is an extension to the Extensible Messaging and Presence Protocol (XMPP) for multi-client end-to-end encryption developed by Andreas Straub. According to Straub, OMEMO uses the Double Ratchet Algorithm "to provide multi-end to multi-end encryption, allowing messages to be synchronized securely across multiple clients, even if some of them are offline".[1] The name "OMEMO" is a recursive acronym for "OMEMO Multi-End Message and Object Encryption". It is an o
  • That admin has started his âoecareerâ in late 90ties, and at those times there was no conflict between russians and ukrainians. there was just one agreement in hacker community - to target anyone except an area of ex-ussr. he was rich, and thatâ(TM)s why it took so long to arrest him

Kill Ugly Processor Architectures - Karl Lehenbauer

Working...