Ukrainian authorities say they have exposed a group of hackers who interfered with the computer network servers of several European and U.S. banks, causing losses of $2.5 billion.
The Prosecutor-General's Office said in a statement on January 27 that since 2014, "hackers from Ukraine" have used malicious software designed to steal personal data such as passwords and logins from servers from private and state banking institutions in Austria, Britain, Germany, Lithuania the Netherlands, Switzerland, and the United States.
The prosecutors said computer and server equipment were seized in police raids in the Kharkiv region.
The investigation was carried out in coordination with the EU’s judicial cooperation unit Eurojust, the European policing agency Europol, as well as U.S. and German law enforcement agencies, the statement said.
It did not give further details.
Editors' Picks
Top Trending
1
U.S., Canadian Warplanes Intercept Russian, Chinese Military Aircraft Near Alaska
2Crowdsourcing Russia's Future: Poll Of Experts Considers What Comes After Putin
3Russia Attacks Ukrainian Danube Port For Second Day As NATO Scrambles Warplanes Over Romania
4Turkey Detains Russian Man Suspected Of Car Bombing In Moscow
5Ukrainian Forces Fight Intense Battles In Donetsk Region, Zelenskiy Says
6Live Briefing: Russia Invades Ukraine
7Pentagon Finds Another $2 Billion Of Accounting Errors For Ukraine Aid
8'Don't Even Whisper In Your Language': Russian Course For Central Asians Lays Down Strict Rules
9Under Relentless Russian Attacks, Ukrainian Power Plant Workers Race To Get The Lights Back On
10Bulgarian President Admits Blocking Pro-Western Envoy To Kyiv
RFE/RL has been declared an "undesirable organization" by the Russian government.
If you are in Russia or the Russia-controlled parts of Ukraine and hold a Russian passport or are a stateless person residing permanently in Russia or the Russia-controlled parts of Ukraine, please note that you could face fines or imprisonment for sharing, liking, commenting on, or saving our content, or for contacting us.
To find out more, click here.