{"id":96747,"date":"2026-05-02T07:00:00","date_gmt":"2026-05-02T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=96747"},"modified":"2026-05-02T09:06:22","modified_gmt":"2026-05-02T06:06:22","slug":"arrests-of-roblox-account-thieves-near-lviv-a-hack-of-a-chinese-task-scheduler-for-mining-and-other-cybersecurity-developments","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/arrests-of-roblox-account-thieves-near-lviv-a-hack-of-a-chinese-task-scheduler-for-mining-and-other-cybersecurity-developments\/","title":{"rendered":"Arrests of Roblox account thieves near Lviv, a hack of a Chinese task scheduler for mining, and other cybersecurity developments"},"content":{"rendered":"<p>A round-up of the week\u2019s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Law enforcement mounted operations against scam centres in Europe, the UAE and Thailand.<\/li>\n<li>Researchers found a phishing kit with AI features.<\/li>\n<li>Hackers from Drohobych sold Roblox players\u2019 credentials for nearly \u20b410m.<\/li>\n<li>A critical flaw in ransomware software causes irreversible data loss.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Law enforcement targeted scam centres in Europe, the UAE and Thailand<\/h2>\n<p>In a joint operation, authorities from the US, China, the UAE and Thailand shut down nine cryptocurrency scam centres and arrested 276 suspects. The US Department of Justice <a href=\"https:\/\/www.justice.gov\/opa\/pr\/coordinated-takedown-scam-centers-leads-least-276-arrests-alleged-managers-and-recruiters\">published<\/a> the report.<\/p>\n<p>Those detained in the UAE and Thailand used \u201c<a href=\"https:\/\/forklog.com\/en\/news\/chainalysis-shift-from-ponzi-schemes-to-pig-butchering-in-crypto-crime\">pig butchering<\/a>\u201d schemes. Once victims agreed, they lost access to the \u201cinvested\u201d cryptocurrency. The criminals also urged them to borrow from relatives and take out loans.<\/p>\n<p>Myanmar national Thet Min Nyi has been charged with conspiracy to commit fraud and money laundering. Investigators allege he served as a manager and recruiter for a criminal outfit known as Ko Thet Company. Members of the Sanduo Group and Giant Company also await trial.\u00a0<\/p>\n<p>In Europe last week, authorities <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/call-centres-dismantled-and-ten-arrested-in-eur-50-million-online-fraud-case\">dismantled<\/a> a scam network that is believed to have caused more than \u20ac50m in losses to victims worldwide.<\/p>\n<p>The joint Europol-Eurojust operation, launched in June 2023, led to the arrest of ten suspects and searches at three call centres and nine private residences in Austria and Albania.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-47caabcfac3a740e-3264535408369786.webp\" alt=\"\u0442\u0438\u0440\u0430\u043d\u0430_\u043a\u043e\u043b\u043b-\u0446\u0435\u043d\u0442\u0440\" class=\"wp-image-279415\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-47caabcfac3a740e-3264535408369786.webp 1600w, https:\/\/forklog.com\/wp-content\/uploads\/img-47caabcfac3a740e-3264535408369786-300x169.webp 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-47caabcfac3a740e-3264535408369786-1024x576.webp 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-47caabcfac3a740e-3264535408369786-768x432.webp 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-47caabcfac3a740e-3264535408369786-1536x864.webp 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><figcaption class=\"wp-element-caption\">Scam centre in Tirana. Source: Europol.<\/figcaption><\/figure>\n<p>According to investigators, victims were lured to bogus investment platforms via search-engine and social-media ads. In reality, funds were routed into an international money-laundering scheme. In a second wave of fraud, the criminals recontacted \u201cclients\u201d offering help to recover lost assets, demanding a further \u20ac500 in cryptocurrency as an upfront fee.<\/p>\n<p>The scamming network was registered as a legitimate business with 450 employees. Operators worked in language-based teams of six to eight, earning around \u20ac800 per month plus bonuses.<\/p>\n<h2 class=\"wp-block-heading\">Researchers found a phishing kit with AI features<\/h2>\n<p>Cybersecurity specialists at <a href=\"https:\/\/www.varonis.com\/blog\/bluekit\">Varonis<\/a> uncovered the Bluekit phishing toolkit. It offers attackers more than 40 templates imitating popular services and includes a built-in AI assistant to draft malicious campaigns.<\/p>\n<p>The kit provides scripts targeting email (Outlook, Hotmail, Gmail, Yahoo, ProtonMail), iCloud, GitHub and the Ledger crypto wallet.<\/p>\n<p>Bluekit\u2019s main draw is its AI Assistant panel, which supports multiple models, including Llama, GPT-4.1, Claude, Gemini and DeepSeek. The tool helps cybercriminals compose phishing emails.<\/p>\n<p>Varonis believes the feature is experimental. A test attack draft had a useful structure but contained generic link fields, placeholders for QR codes and text requiring polishing before use.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-b910079d1f963cb0-3264368653792217.webp\" alt=\"image\" class=\"wp-image-279412\"\/><figcaption class=\"wp-element-caption\">Source: Varonis.<\/figcaption><\/figure>\n<p>Beyond AI, Bluekit folds management of the entire attack lifecycle into a single console:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>domain registration.<\/strong> Purchase and configure addresses directly from the interface;<\/li>\n<li>campaign management. Build phishing pages with realistic designs and logos of well-known brands such as Zara, Zoho and Ledger;<\/li>\n<li><strong>fine-tuning.<\/strong> Block traffic via VPNs and proxies, cut off automated analysis systems and set filters based on device fingerprints;<\/li>\n<li><strong>data capture.<\/strong> Exfiltrate stolen information via Telegram to hackers\u2019 private channels.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-56dad24bb2dea937-3264368150955674.webp\" alt=\"image\" class=\"wp-image-279411\"\/><figcaption class=\"wp-element-caption\">Source: Varonis.<\/figcaption><\/figure>\n<p>The platform can track victims\u2019 sessions in real time, including cookies, local storage and the state of the active session post-login. This helps attackers adjust their campaigns for maximum effect.<\/p>\n<p>Despite being under active development, the product is evolving quickly and could gain wide adoption, researchers say.<\/p>\n<h2 class=\"wp-block-heading\">Hackers from Drohobych sold Roblox players\u2019 credentials for nearly \u20b410m<\/h2>\n<p>Law enforcement in Lviv region arrested fraudsters who stole Roblox accounts worth \u20b410m, according to the <a href=\"https:\/\/gp.gov.ua\/ua\/posts\/na-lvivshhini-zatrimano-xakersku-grupu-yaka-zlamuvala-igrovi-akaunti-i-otrimala-maize-10-mln-grn-pributku-vid-yix-prodazu-v-rosiyu\">Office of the Prosecutor General of Ukraine<\/a>.<\/p>\n<p>According to investigators, three residents of Drohobych promoted infostealers disguised as tools to enhance gameplay. With the malware, the hackers gained access to victims\u2019 credentials.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-87dbb306ce4d68b0-3264370561188100.webp\" alt=\"image\" class=\"wp-image-279414\"\/><figcaption class=\"wp-element-caption\">Source: Office of the Prosecutor General of Ukraine.<\/figcaption><\/figure>\n<p>The accesses obtained were checked with a special programme (a checker) that revealed account contents. From October 2025 to January 2026, more than 610,000 accounts were sifted to find the most valuable. The data were sold for cryptocurrency on Russian platforms.<\/p>\n<p>Following ten searches, officers seized equipment, records, more than \u20ac2,500 and about $35,000. The suspects have been notified of suspicion of theft and cybercrime.<\/p>\n<h2 class=\"wp-block-heading\">A critical flaw in ransomware software causes irreversible data loss<\/h2>\n<p><a href=\"https:\/\/research.checkpoint.com\/2026\/vect-ransomware-by-design-wiper-by-accident\/\">Check Point<\/a> researchers have found a serious defect in the handling of cryptographic nonces in the VECT 2.0 ransomware. Instead of encrypting, the bug destroys data beyond recovery.<\/p>\n<p>The issue lies in how VECT 2.0 handles files larger than 128KB. To speed up processing, the program splits objects into four parts and encrypts them separately. But programming-logic errors lead to catastrophic results:<\/p>\n<ol class=\"wp-block-list\">\n<li>All parts of a file use the same memory buffer for nonce output. Each newly generated key overwrites the previous one.<\/li>\n<li>As a result, only a single part remains and is written to disk.<\/li>\n<li>Only the last 25% of a file can be recovered. The first three parts cannot be decrypted because the unique numbers required were irretrievably lost during execution.<\/li>\n<\/ol>\n<p>Even if a victim pays, the attackers cannot decrypt the data because the deleted nonces are not sent to their servers.<\/p>\n<p>Researchers note the 128KB threshold is tiny, covering virtually all valuable corporate information:<\/p>\n<ul class=\"wp-block-list\">\n<li>virtual-machine images;<\/li>\n<li>databases and backups;<\/li>\n<li>office documents, spreadsheets and mailboxes.<\/li>\n<\/ul>\n<p>This turns the malware from ransomware into a straightforward wiper, making ransom payments pointless. The flaw affects all VECT 2.0 variants \u2014 Windows, Linux and ESXi.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-29ac6ddea3830834-3264369704067262.webp\" alt=\"image\" class=\"wp-image-279413\"\/><figcaption class=\"wp-element-caption\">Incorrect cipher name in the operators\u2019 advert. Source: Check Point.<\/figcaption><\/figure>\n<p>According to experts, VECT was actively advertised on the BreachForums hacking platform. Operators invited users to become partners and distributed access keys via private messages.\u00a0<\/p>\n<p>Later, the group announced a partnership with TeamPCP \u2014 the team behind recent supply-chain attacks on Trivy, <a href=\"https:\/\/forklog.com\/en\/news\/india-arrests-trafficker-solana-used-as-a-dead-drop-and-other-cybersecurity-developments\">LiteLLM<\/a>, Telnyx and the European Commission. The aim was to use victims to deploy ransomware.<\/p>\n<h2 class=\"wp-block-heading\">Hackers breached the Qinglong task scheduler to mine cryptocurrency<\/h2>\n<p>Attackers exploited two authentication-bypass vulnerabilities in the Qinglong task scheduler to mine cryptocurrency surreptitiously on developers\u2019 servers, according to cybersecurity firm <a href=\"https:\/\/snyk.io\/blog\/qinglong-task-scheduler-rce-vulnerabilities\/\">Snyk<\/a>.<\/p>\n<p>Qinglong is an open-source Python\/JS task-management platform popular among Chinese developers.<\/p>\n<p>The remote-code-execution infection chain affected Qinglong version 2.20.1 and earlier.<\/p>\n<p>Researchers say the root cause lay in a mismatch between the middleware\u2019s authorisation logic and how the Express.js web framework routed requests. The authentication layer assumed certain URL patterns would always be handled in one way, whereas Express.js behaved differently.<\/p>\n<p>According to Snyk, the attackers\u2019 campaign began on February 7th 2026. Qinglong users were the first to <a href=\"https:\/\/github.com\/whyour\/qinglong\/issues\/2923\">spot<\/a> a hidden malicious process, .FULLGC, whose name mimicked a standard resource-intensive task to evade notice.\u00a0<\/p>\n<p>The miner consumed 85\u2013100% of CPU and targeted Linux, ARM64 and macOS systems. Qinglong\u2019s developers fixed the flaw in PR 2941.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>April <a href=\"https:\/\/forklog.com\/en\/news\/april-sets-record-for-crypto-industry-hacks\">set a record<\/a> for hacks in the crypto industry.<\/li>\n<li>A hacker <a href=\"https:\/\/forklog.com\/en\/news\/hacker-extracts-over-5-million-from-wasabi-protocol\">withdrew<\/a> more than $5m from the Wasabi protocol.<\/li>\n<li>ZetaChain <a href=\"https:\/\/forklog.com\/en\/news\/zetachain-discloses-details-of-334000-cross-chain-attack\">disclosed details<\/a> of a $334,000 cross-chain attack.<\/li>\n<li>Hackers <a href=\"https:\/\/forklog.com\/en\/news\/hackers-breach-defi-protocol-scallop\">attacked<\/a> the Scallop DeFi protocol.<\/li>\n<li>Litecoin <a href=\"https:\/\/forklog.com\/en\/news\/litecoin-undergoes-block-reorganization-due-to-zero-day-vulnerability\">underwent<\/a> a block reorg due to a zero-day bug.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>For those who missed the month\u2019s highlights, ForkLog has prepared a short recap.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A round-up of the week\u2019s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":96748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"This week\u2019s key cybersecurity developments.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-96747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"16","promo_type":"1","layout_type":"1","short_excerpt":"This week\u2019s key cybersecurity developments.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/96747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=96747"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/96747\/revisions"}],"predecessor-version":[{"id":96749,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/96747\/revisions\/96749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/96748"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=96747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=96747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=96747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}