Spain arrests alleged person responsible for money laundering at Kelvin Security

Spain’s national police on Sunday arrested an alleged money laundering official from the for-profit hacking operation Kelvin Security, who allegedly entered the country as a tourist.

See also: On Demand | Understanding Human Behavior: Addressing the Challenge of ATO and Fraud Prevention in the Retail Industry

Authorities opened an investigation into the group in December 2021 after hackers penetrated systems belonging to the cities of Madrid, Sevilla and Badajoz as well as the regional government of Castilla-La Mancha.

The Interior Ministry said security experts attributed the attacks to Kelvin Security, at least in part, after seeing posts on criminal forums promoting stolen knowledge. The Spanish government has calculated that Kelvin Security, introduced in 2013, has sold knowledge from more than 300 organizations. in 90 countries over the past 3 years. Threat intelligence firm Cycompanya said the organization was likely founded in Russia and has “a significant presence on deep and dark internet forums. “

The arrested man (the government is not disclosing his name) is the head of Kelvin Security’s cash laundering operations, the ministry said, and operates primarily in the cryptocurrency space. A video released through the ministry shows police searching for devices on what appears to be a and escorting a guy dressed in a black hoodie to a waiting car.

Local media reported that the suspect had entered Spain on Nov. 18 with his wife and sister, bound for the Mediterranean coastal town of Alicante. They didn’t take the flight back to Venezuela scheduled for Nov. 29 and a reporter said the guy was on a blacklist from Caracas. and hoped to leave the South American country.

Kelvin Security has claimed responsibility for a series of high-profile knowledge breaches, adding those of Vodafone Italy, Dish Mexico, a Chilean bank and New York-based consulting firm Frost.

The threat actor’s most recent attack was against the headquarters of an unnamed multinational energy firm, and it stole a confidential client list containing more than 85,000 names.

Further “

Log in now

Complete your profile and stay informed

Contact Support

Sign in now

Log in now

Our website uses cookies. Cookies allow us to provide the most productive experience imaginable and help us understand how visitors use our online site. By using databreachtoday. com, you agree to our use of cookies.

Leave a Comment

Your email address will not be published. Required fields are marked *