Large-scale Roblox hacking operation shut down by Ukrainian authorities


Large-scale Roblox hacking operation shut down by Ukrainian authorities

Pierluigi Paganini
April 30, 2026

Ukrainian police arrested three hackers who hijacked 610,000 Roblox accounts and sold them for $225,000 in profit.

Police in Ukraine arrested three suspects accused of hacking over 610,000 Roblox accounts and selling them for about $225,000. Officers carried out multiple searches in Lviv, seizing cash, phones, computers, laptops, tablets, and USB drives. The operation disrupted a large-scale account theft scheme targeting gamers and online platforms.

A 19-year-old from Drohobych, with two accomplices, used stolen session cookies to access accounts without passwords. They scanned over 610,000 profiles, identifying those with valuable virtual currency or rare items. Using specialized tools, they verified access and compiled 357 files of high-value accounts. The group then sold these on Russian platforms, receiving payments in cryptocurrency.

“From October 2025 to January 2026, over 610,000 user accounts were checked in this manner. They selected those that contained the most valuable digital resources. During investigative actions, law enforcement discovered 357 files with such accounts.” reads the press release published by Prosecutor General’s Office. “Subsequently, these files were sold on Russian resources, with payment made to a cryptocurrency wallet. According to preliminary information, the profit from the sale of accounts during the entire period of the group’s activities could reach nearly 10 million UAH.”

Ukrainian Police carried out 10 searches, seizing computers, phones, storage devices, bank cards, notes, and cash over €2,500 and $35,000. Suspects were charged with theft in conspiracy and unauthorized interference in information systems causing data leaks. A 44-year-old associate was also detained for drug possession with intent to sell after cannabis-like substances were found.

For these crimes, the hackers were charged under Articles 185 (theft) and 361 (unauthorized interference with IT systems) and could face up to 15 years in prison. The investigation is still ongoing to identify other possible accomplices and additional victims linked to the hacking group.

“Under the procedural guidance of the Lviv Regional Prosecutor’s Office and the Frankivsk District Prosecutor’s Office of Lviv, the group members were informed of suspicions of theft by prior conspiracy of a group of individuals, as well as unauthorized interference in the operation of information (automated) systems, which led to the leakage of information by prior conspiracy of a group of individuals (Part 4 of Article 185, Part 5 of Article 361 of the Criminal Code of Ukraine).” concludes the press release.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Roblox)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Apple’s Hide My Email feature has always been a pretty good quality-of-life privacy tool. iCloud+ subscribers can access randomly generated email addresses that forward messages to their real inbox. This helps users avoid any apps or websites from seeing their actual address. Apple also states that it doesn’t read the forwarded messages either.

All of this makes it quite a handy tool that genuinely cuts down on spam, creating a distance between you and whatever sketchy service wants your email.

But what it apparently does not do is hide your identity from law enforcement.

What’s going on?

According to court documents seen by TechCrunch, Apple provided federal agents with the real identities of at least two customers who had used Hide My Email addresses. One case in particular had the FBI seek records in an investigation that involved an email allegedly threatening Alexis Wilkins, who has been publicly reported as the girlfriend of FBI director Kash Patel.

The affidavit cited in the report states that Apple identified the anonymized address as being associated with the target Apple account. The company even provided the account holder’s full name and email address, along with records of another 134 anonymized email accounts created through this privacy feature.

TechCrunch also says it reviewed a second search warrant tied to an investigation by Homeland Security, where Apple again provided information linking Hide My Email accounts back to a user.

Why does this concern you

Before anyone starts calling out Apple for breaching privacy, they should know the distinction between companies and official warrants. Hide My Email is designed to protect users from apps, websites, and marketers, not from legal requests.

Apple still stores customer data like names, addresses, billing details, and other unencrypted info, which can be handed over when authorities come knocking with the right paperwork. So an email is a weak point here. Most emails are still not end-to-end encrypted, which means it is fundamentally different from services like Signal, whose popularity has grown precisely because of their robust privacy model.



Source link