Site iconSite icon ForkLog

Half-billion crypto extortion, a dating-app leak and other cybersecurity headlines

Half-billion crypto extortion, a dating-app leak and other cybersecurity headlines

We round up the week’s key cybersecurity developments.

  • Checkmate for crypto extortionists.
  • Cyberattacks on retailers and Aeroflot.
  • Minnesota’s capital hit by a major cyberattack.
  • A dating app lost confidential images.

Checkmate for crypto extortionists

Law-enforcement action disrupted BlackSuit, a cybercriminal network specialising in ransomware.

Ukraine’s cyber police joined the international Operation Checkmate, which involved law-enforcement agencies from more than five Europol member countries and US authorities.

The attackers built malware that encrypted user data using various combinations of algorithms. They demanded cryptocurrency in exchange for decryption and for not publishing stolen information.

According to Ukraine’s cyber police, the group repeatedly rebranded:

Total ransom demands exceeded $500m, with the largest single demand at $60m. Targets were mainly commercial and public-sector organisations outside the CIS—particularly in the US, Europe and Japan.

According to FBI Dallas, more than 20 bitcoins were seized on April 15 as part of the operation. The funds were traced to an address allegedly linked to a member of the Chaos group using the alias Hors.

The US Department of Justice said that on July 24, 2025 it filed a forfeiture complaint for more than $2.4m.

Cyberattacks on retailers and Aeroflot

On July 28 Aeroflot reported disruptions to its IT systems. Hacktivist groups “Cyberpartisans BY” and Silent Crow claimed responsibility; more than 100 flights were cancelled.

According to RBC, the airline could have lost over 250m roubles in a single day. Factoring in infrastructure recovery, lost revenue and other costs, the damage may reach several billion roubles.

Pharmacy chains Stolichki and Neopharm also faced issues—they halted online reservations and temporarily closed some retail outlets. Roskomnadzor said there were no signs of DDoS attacks.

Earlier, Novabev Group reported a cyberattack that hit the Winelab alcohol retail chain, knocking out supermarkets in Moscow, the Moscow region, St Petersburg and other cities. The attackers demanded a ransom, which the company refused to pay.

Minnesota’s capital hit by a major cyberattack

Minnesota governor Tim Walz called in the National Guard in response to a destructive cyberattack that hit the state capital, St Paul, on July 25.

The incident continued through July 26–27 and caused widespread disruption across the city, impairing digital services and critical systems.

“Since the cyberattack was detected, the Saint Paul authorities have been working around the clock, closely coordinating with Minnesota IT Services and an external cybersecurity firm. Unfortunately, the scale and complexity of the incident exceeded the capabilities of both internal and commercial response services,” the emergency executive order states.

As of July 29, online payments were unavailable and some services at libraries and recreation centres were suspended. City authorities are working with local, state and federal partners to investigate and fully restore systems.

A dating app lost confidential images

On July 25 Tea, a popular safety-focused dating app, suffered a data breach that exposed 72,000 sensitive images. These included selfies and ID photos used for account verification, as well as images from user messages and posts.

A second vulnerability later came to light, leaking additional user data. On July 29 the developers disabled direct messages.

Tea app interface. Source: Tea.

The developers said the first leak affected only users who registered before February 2024. However, in a comment to 404 Media, cybersecurity specialist Kasra Rahjerdi said the leaked dataset contains messages from 2023 up to the discovery of the attack—more than 1.1m in total.

Hackers plugged into a bank—literally

According to Group-IB, the threat group UNC2891, also known as LightBasin, used a Raspberry Pi microcomputer with 4G to attack a bank in a recently identified incident.

The single-board computer was physically connected to an ATM network switch, creating a covert access channel into the bank’s internal infrastructure. This allowed the attackers to move laterally and plant backdoors.

Diagram of a hybrid attack using a Raspberry Pi with a 4G modem. Source: GROUP-IB.

Group-IB discovered the intrusion attempt while investigating suspicious activity. According to the firm, the goal was to spoof ATM authorisation and conduct fraudulent cash withdrawals.

Although LightBasin did not succeed, the incident is a rare example of a hybrid attack that combines physical access with remote intrusion and extensive tradecraft to evade detection.

Also on ForkLog:

What to read this weekend?

How do millions hide behind hundreds of $50 transfers? What tools make sense of the crypto chaos, and can the digital trail be followed to the end? Grigory Osipov, director of investigations at Shard, explains.

Exit mobile version