Back

Ukraine Uncovers $721K Cybercrime Scheme Targeting California Retailer

Severity: High (Score: 66.5)

Sources: Cybernews, Bitdefender, Thecyberexpress, Therecord.Media, Gp.Ua

Published: 2026-05-21 · Updated: 2026-05-21

Keywords: ukraine, online, police, cybercrime, scheme, accounts, cyber

Summary

Ukrainian authorities have identified an 18-year-old suspect linked to a cybercrime operation that compromised nearly 30,000 customer accounts of a California-based online retailer. The operation, which ran from 2024 to 2025, involved the use of infostealer malware to harvest sensitive data, including login credentials and session tokens. Approximately 5,800 of the compromised accounts were exploited for unauthorized purchases totaling around $721,000, leading to direct losses exceeding $250,000. The investigation was initiated after U.S. law enforcement alerted Ukrainian officials about potential cyberattacks from Ukraine targeting American e-commerce platforms. Evidence collected during searches included mobile phones, computers, and cryptocurrency accounts, but no arrests have been reported yet. The suspect is believed to have managed the infrastructure for processing and selling stolen data through underground platforms. Key Points: • An 18-year-old from Odesa is suspected of managing a cybercrime operation targeting a California retailer. • The scheme compromised nearly 30,000 accounts, leading to unauthorized purchases worth $721,000. • Infostealer malware was used to harvest sensitive data, highlighting the growing threat of credential theft.

Detailed Analysis

**Impact** Nearly 30,000 customer accounts of a California-based online retailer were compromised between 2024 and 2025. At least 5,800 of these accounts were used for unauthorized purchases totaling approximately $721,000, causing direct financial losses exceeding $250,000 due to chargebacks and related costs. The affected sector is e-commerce, with victims primarily in the United States. Sensitive customer data including login credentials and session tokens were stolen, exposing users to fraud and account takeover. **Technical Details** The attack employed infostealer malware to infect victims’ devices and harvest login credentials, browser cookies, session tokens, and authentication data. Stolen session data enabled attackers to bypass standard authentication controls. The malware transmitted harvested data to attacker-controlled servers, where it was processed and sold via underground platforms and Telegram bots. Cryptocurrency services were used for financial transactions within the criminal network. No specific CVEs or additional malware families were reported. **Recommended Response** Defenders should implement monitoring for unusual session activity and enforce token revocation upon suspected compromise. Multi-factor authentication should be strengthened beyond password and one-time codes to detect and block unauthorized access using stolen session tokens. Endpoint protection solutions capable of detecting infostealer malware should be deployed, and users should be educated on malware removal. Organizations should monitor for suspicious purchase patterns and review cryptocurrency transaction logs related to account misuse.

Source articles (6)

  • Ukraine Busts Massive Cybercrime Scheme Behind 28,000 Stolen Accounts — Thecyberexpress · 2026-05-21
    The National Police of Ukraine has disclosed an international cybercrime operation tied to the theft of nearly 30,000 customer accounts belonging to a California-based online retailer, authorities sai…
  • Ukraine Investigates Teen Suspect in California E-Commerce Cyber Theft — Technadu · 2026-05-21
    Ukrainian authorities have identified an 18-year-old suspect, a resident of Odesa, who is allegedly linked to a sophisticated international cybercrime operation that compromised nearly 30,000 customer…
  • Ukrainian police name 18-year — Cybernews · 2026-05-21
    In what could be called a truly international criminal op, an 18-year-old hacker from Odessa, a port city in Ukraine, ran an infostealer malware operation and conspired with other cyber crooks to targ…
  • Ukrainian police identify perp in $721k infostealer scheme — Bitdefender · 2026-05-21
    Ukrainian cyberpolice say a California online store was targeted by an infostealer-driven account-takeover operation involving 28,000 compromised accounts. Ukrainian cyberpolice, in a joint effort wit…
  • Ukraine probes teen suspect in cyber theft scheme targeting California online shoppers — Therecord.Media · 2026-05-20
    The investigation began after U.S. authorities informed their Ukrainian counterparts that hackers operating from Ukraine could be involved in attacks targeting users of American e-commerce platforms,…
  • Hackers who caused more than $250,000 in damage to US online platforms were exposed in Odesa — Gp.Ua · 2026-05-20
    Prosecutors of the Office of the Attorney General, together with the Main Investigative Department of the National Police and the Cyber Police of Odesa, uncovered participants of an international hack…

Timeline

  • 2024-01-01 — Cybercrime operation begins: The operation targeting California online store customers commenced, utilizing infostealer malware.
  • 2025-12-31 — Operation concludes: The cybercriminal group exploited over 28,000 accounts before being identified by authorities.
  • 2026-05-12 — Searches conducted: Ukrainian police executed searches at the suspect's residences, seizing digital evidence.
  • 2026-05-21 — Public announcement made: Ukrainian authorities publicly identified the suspect and detailed the operation's impact.

Related entities

  • Credential Stuffing (Attack Type)
  • Data Breach (Attack Type)
  • Malware (Attack Type)
  • Inditex (Company)
  • PcComponentes (Company)
  • Rituals Cosmetics (Company)
  • Ukraine (Country)
  • United States (Country)
  • CWE-200 - Exposure of Sensitive Information (Cwe)
  • T1003 - OS Credential Dumping (Mitre Attack)
  • T1041 - Exfiltration Over C2 Channel (Mitre Attack)
  • T1078 - Valid Accounts (Mitre Attack)
  • T1110 - Brute Force (Mitre Attack)
  • T1567 - Exfiltration Over Web Service (Mitre Attack)
  • Telegram (Platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed