Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-395458 V1.0: Account Hijacking Vulnerability in Mendix SAML Module

    April 30, 2026

    VulnCheck Initial Access Intelligence Update – July 2024 | Blog

    April 30, 2026

    ZDI-26-172: Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability

    April 30, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Hackers arrested for hijacking and selling 610,000 Roblox accounts
    News

    Hackers arrested for hijacking and selling 610,000 Roblox accounts

    adminBy adminApril 30, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Hackers arrested for hijacking and selling 610,000 Roblox accounts

    The Ukrainian police have arrested three individuals who hacked more than 610,000 Roblox gaming accounts and sold them for a profit of $225,000.

    The arrests were made by the police in Lviv after conducting ten searches on targeted locations, seizing $35,000 in cash, 37 mobile phones, 11 desktop computers, seven laptops, five tablets, and four USB drives.

    Although the police did not specify the game platform targeted by the hackers, aged 19, 21, and 22, the Prosecutor General’s Office stated that it was Roblox.

    image

    “Prosecutors of the Lviv region, together with the cyber police and the Security Service of Ukraine, have stopped the activities of a group that gained access to other people’s gaming accounts and used them as a source of income,” reads the press release from the Prosecutor General’s Office.

    “This concerns profiles in Roblox, where users create games, communicate, and purchase virtual items with in-game currency. For many, such accounts hold not only gaming value but also financial value due to accumulated resources and purchased items.”

    Image from the police operation
    Image from the police operation
    Source: gp.gov.ua

    Roblox is a gaming platform where people can create and play millions of games. Roblox accounts aren’t limited to gaming, as they can also be used for building assets on Roblox Studio and selling items to others, in exchange for the in-game currency Robux.

    For many, these accounts have monetary value, hold high Robux balances, contain limited-edition items that can no longer be obtained, preserve years of in-game progress with unlocks and achievements, offer paid access to premium content, and more.

    The authorities state that, at least 357 of the 610,000 user accounts the hackers took over between October 2025 and January 2026, were high-value (“elite”) accounts.

    The 19-year-old is identified as the leader of the threat group, who recruited the other two on gaming forums and set up the account-hacking scheme.

    The scheme involved promoting info-stealing malware disguised as a game-enhancer tool, infecting victim devices, and collecting their login credentials.

    The stolen accounts were then categorized by value, inventory rarity, and remaining Roblux balances, and sold via a Russian website and on “closed” online communities.

    For these offenses, the hackers were charged under articles 185 (theft) and 361 (unauthorized interference with IT systems) and face up to 15 years of imprisonment.

    The authorities continue their investigation to identify other possible accomplices and victims of the hacking group.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-186: Fortinet FortiClient Link Following Local Privilege Escalation Vulnerability
    Next Article SSA-707630 V1.1 (Last Update: 2025-08-26): Multiple Vulnerabilities in SIMATIC RTLS Locating Manager Before V3.3
    admin
    • Website

    Related Posts

    News

    VulnCheck Initial Access Intelligence Update – July 2024 | Blog

    April 30, 2026
    News

    VulnCheck and Sevco – Real-time Threat Visibility and the Most Comprehensive Asset Intelligence | Blog

    April 30, 2026
    News

    Popular WordPress redirect plugin hid dormant backdoor for years

    April 29, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    SSA-395458 V1.0: Account Hijacking Vulnerability in Mendix SAML Module

    April 30, 2026

    VulnCheck Initial Access Intelligence Update – July 2024 | Blog

    April 30, 2026

    ZDI-26-172: Unraid Authentication Request Path Traversal Authentication Bypass Vulnerability

    April 30, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.