Video: Lapsus$, the British police announce the arrest of seven teenagers


The Lapsus$ group’s vacation has been turned upside down: as announced by the BBC, the British police have arrested seven people suspected of being members of the cybercriminal group that hacked Microsoft, Okta, Samsung and Nvidia. The suspects are teenagers aged 16 to 21 and have been placed under judicial supervision following their arrest.

White/breachbase identified

Over the past two days, multiple security researchers and journalists reported identifying one of the group’s members known by the aliases “White” and “breachbase.”

This one would have been identified thanks to precise data on his identity, published online in January on the Doxbin site. This data was allegedly released in error by White following a dispute between him and the owners of Doxbin, a site used to disseminate data.

“The dox revealed that ‘White’, aka Alexander, of Lapsus$, was a 16-year-old boy from Albania, living with his mother in the UK, where he attended a special school,” says Sekoia. in his article dedicated to the group Lapsus$. British police have not said whether the teenager was one of seven people arrested yesterday.

The group’s Telegram channel still active

According to Company 221B, which worked with Palo Alto on tracking the Lapsus$ group, White had already been identified by researchers since mid-2021, and authorities had been made aware of his activities.

According to 221B, as with Sekoia, White could be one of the main members of Lapsus$, if not the mastermind of the group. But it is not yet known whether the arrests announced yesterday will be enough to put an end to the activities of the group, which seems to have several members. The Telegram channel used by Lapsus$ to communicate about its victims is still active and a new message was published on March 25 to warn subscribers to the channel about possible scam attempts exploiting the name of Lapsus $.

The Lapsus$ group has drawn a lot of attention over the past few months by claiming several high profile hacks. But security researchers who followed in the group’s footsteps also pointed to their chaotic communication and numerous mistakes in their attempt to cover up their tracks.





Source link -97