Ukrainian authorities say they have exposed a group of hackers who interfered with the computer network servers of several European and U.S. banks, causing losses of $2.5 billion.
The Prosecutor-General's Office said in a statement on January 27 that since 2014, "hackers from Ukraine" have used malicious software designed to steal personal data such as passwords and logins from servers from private and state banking institutions in Austria, Britain, Germany, Lithuania the Netherlands, Switzerland, and the United States.
The prosecutors said computer and server equipment were seized in police raids in the Kharkiv region.
The investigation was carried out in coordination with the EU’s judicial cooperation unit Eurojust, the European policing agency Europol, as well as U.S. and German law enforcement agencies, the statement said.
It did not give further details.
Editors' Picks
Top Trending
1
EU To Target Chinese Firms With Asset Freezes, Visa Bans For Aiding Russia In Ukraine
2Who Is Calin Georgescu, The Far-Right Winner Of Romania's Presidential First Round?
3Pakistani Capital Locked Down, Internet Partially Suspended Ahead Of Protest
4Russian Beaten In Custody By Kadyrov's Son Gets 13 1/2 Years In Prison
5It's Election Season In Romania. Here's Everything You Need To Know.
6Ukraine Live Briefing: Merkel Defends Stance On NATO Membership For Kyiv
7The Life, And Nail-Biting Work, Of A Ukrainian Sapper
8Interview: Could A Demilitarized Zone End The Ukraine War?
9Pro-West PM Leads Romanian Presidential Vote, Russia-Friendly Candidate Makes Surprise Challenge
10Zelenskiy Says Putin Aiming To Regain Kursk Territory Before Trump Takes Office
RFE/RL has been declared an "undesirable organization" by the Russian government.
If you are in Russia or the Russia-controlled parts of Ukraine and hold a Russian passport or are a stateless person residing permanently in Russia or the Russia-controlled parts of Ukraine, please note that you could face fines or imprisonment for sharing, liking, commenting on, or saving our content, or for contacting us.
To find out more, click here.