MOSCOW / LONDON (IT BOLTWISE) – In a surprise raid, Russian police have arrested three developers of the notorious Meduza stealer. This malware, which was offered as malware-as-a-service, has been stealing sensitive data from users worldwide since 2023. The arrests mark a turning point in Russia’s handling of the domestic hacker scene.

Today’s daily deals at Amazon! ˗ˋˏ$ˎˊ˗

In a surprising turn of events, on October 30, 2025, Russian police arrested three people suspected of developing and selling the Meduza Stealer. These arrests took place in Moscow and its surrounding areas and were carried out by the Investigative Department of the Russian Interior Ministry. Those arrested, described as young IT specialists, are said to have operated Meduza as a profitable malware-as-a-service (MaaS) business.

The Meduza Stealer, a program developed in C++, has quickly become a powerful information thief. It is capable of stealing sensitive data such as login details from over 100 browsers and 27 password managers, cryptocurrency information from over 100 wallets, and data from messaging and gaming clients such as Telegram and Steam. The malware was actively sold on underground forums and through Telegram channels, with the latest version, Meduza 2.2, being offered for $199 per month or $1,199 for a lifetime membership.

A key turning point in the investigation was the group’s alleged attack on a Russian government organization in the Astrakhan region. This attack was potentially a fatal mistake as the Meduza Stealer was specifically designed with a geo-filter to avoid targets in Russia, Kazakhstan and Belarus. This operational security (OpSec) rule is widely used among local cybercriminals to protect themselves from the authorities.

During the raids, police confiscated computers, phones and bank cards. Video footage of the operation, carried out with the support of Rosgvardia forces, shows officers storming several apartments. A suspect was filmed wearing ‘Hello Kitty’ pajama pants. Investigators also discovered that the group had developed a second, unidentified piece of malware designed to bypass security measures and create botnets. If the three young specialists are convicted on all charges, they could face a prison sentence of up to five years.

These arrests signal a clear and significant change in Moscow’s attitude. According to a report from Recorded Future’s Insikt Group, Russia’s strategy towards the local hacker scene is moving from passive tolerance to active control. These arrests confirm the finding that Russia uses selective arrests and public crackdowns to assert state authority and target domestic hackers who become too visible or politically inconvenient.


Order an Amazon credit card without an annual fee with a credit limit of 2,000 euros!

Bestseller No. 1 ᵃ⤻ᶻ “KI Gadgets”

Bestseller No. 2 ᵃ⤻ᶻ “KI Gadgets”

Bestseller No. 3 ᵃ⤻ᶻ “KI Gadgets”

Bestseller No. 4 ᵃ⤻ᶻ «KI Gadgets»

Bestseller No. 5 ᵃ⤻ᶻ “KI Gadgets”

Did you like the article or news - Russia steps up measures against cybercrime: Meduza stealer developer arrested -? Then subscribe to us on Insta: AI News, Tech Trends & Robotics - Instagram - Boltwise

Our KI morning newsletter “The KI News Espresso” with the best AI news of the last day free by email – without advertising: Register here for free!




Russia Steps Up Measures Against Cybercrime: Meduza Stealer Developer Arrested
Russia steps up measures against cybercrime: Meduza stealer developer arrested (Photo: DALL-E, IT BOLTWISE)

Please send any additions and information to the editorial team by email to de-info[at]it-boltwise.de. Since we cannot rule out AI hallucinations, which rarely occur with AI-generated news and content, we ask you to contact us via email and inform us in the event of false statements or misinformation. Please don’t forget to include the article headline in the email: “Russia Steps Up Action Against Cybercrime: Meduza Stealer Developer Arrested”.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *