Skip to content
  • BlueNoroff Fake Zoom Malware: IOCs, Attack Chain, and Defenses for Crypto Teams
  • EnOcean SmartServer CVE-2026-20761 Opens Buildings to Remote Takeover
  • cPanel CVE-2026-41940 Was Actively Exploited for 30 Days Before Patch
  • 12 Allied Agencies Warn: China-Nexus Actors Are Building Covert Botnets from Your Routers and Cameras
  • Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft
April 30, 2026
Follow Us :
Ciphers Security Logo Stylized logo for Ciphers Security
  • Home
  • Ethical Hacking
    • Module 1, Information Gathering
    • Scanning Network
  • THM Walkthrough
  • News
  • About Us
Ciphers Security Logo Stylized logo for Ciphers Security

About Us

Ciphers Security, are here to provide you with the latest information and trends in the cybersecurity field.

Contact Info

contact@cipherssecurity.com

Follow Us

Ciphers Security Logo
  • Home
  • Ethical Hacking
    • Module 1, Information Gathering
    • Scanning Network
  • THM Walkthrough
  • News
  • About Us
Ciphers Security News Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft
News

Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft

  • by Team Ciphers Security
  • April 30, 2026
  • 0 Comments
  • 3 minutes read
  • 6 Views
  • 2 hours ago
Facebook Twitter LinkedIn Whatsapp Cloud Print Share via Email
Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft

Table of Contents

Toggle
  • Roblox Account Hijacking: What We Know So Far
  • Why Roblox Account Hijacking Matters Beyond Gaming
  • Roblox Account Hijacking: What You Should Do Now
  • Detection and Verification Checklist

Ukrainian cyber police have arrested three individuals who used cookie-harvesting malware to compromise more than 610,000 Roblox gaming accounts between October 2025 and January 2026, selling high-value accounts on Russian-language platforms and pocketing approximately UAH 10 million (~$225,000 USD) paid in cryptocurrency.

Roblox Account Hijacking: What We Know So Far

The operation was run out of Lviv by a 19-year-old organiser who recruited two accomplices aged 21 and 22. Rather than cracking passwords, the attackers deployed malicious software that harvested browser session cookies, allowing them to authenticate to victim accounts without needing credentials at all — a technique that bypasses passwords, SMS OTPs, and many 2FA implementations tied to the password-reset flow.

Over the four-month campaign, the group checked over 610,000 accounts for valuable in-game items and Robux balances. Investigators found 357 files containing selected high-value accounts at the time of arrest. The accounts were listed for sale on Russian-language marketplace platforms, with buyers paying through cryptocurrency wallets — a pattern investigators say is consistent with a for-profit credential resale operation rather than targeted espionage.

Law enforcement executed 10 search warrants across residences and registered addresses. Seized items included computer equipment, storage devices, mobile phones, bank cards, physical notes documenting the operation, more than €2,500 in cash, and approximately $35,000 USD.

The Lviv region Cyber Police and prosecutors led the investigation. Criminal proceedings are underway; charges have not yet been publicly confirmed, but Ukrainian law covers unauthorised access to computer systems, theft, and money laundering via cryptocurrency.

Secondary reporting from The Record (Recorded Future) confirms Ukrainian authorities classified this as a significant organised cybercrime operation rather than an isolated incident.

Why Roblox Account Hijacking Matters Beyond Gaming

For security practitioners, this arrest is a case study in the ongoing scalability of cookie-based session hijacking — an attack that has become one of the most effective credential theft vectors precisely because it sidesteps the password-centric defenses most organisations have invested in.

Platforms like Roblox are attractive targets not just for their user base, but because in-game economies are liquid and largely pseudonymous. Digital items and currency convert quickly to real money through grey-market trading sites, many of which operate from jurisdictions with limited cooperation on cybercrime extradition. The Russian-platform sales channel in this case adds an additional layer of operational insulation.

The same technique scales to higher-value targets. Infostealer malware families — including Redline, LummaC2, and Vidar — harvest session cookies from browsers as a core function. Enterprise SSO tokens, cloud provider sessions, and SaaS application cookies stored in browser profiles are exfiltrated by the same mechanisms used here against Roblox players. The difference between a stolen Roblox cookie and a stolen AWS console session token is the size of the blast radius.

Roblox Account Hijacking: What You Should Do Now

For individual users and organisations running platforms with in-game economies:

  1. Enable authenticator-app 2FA on gaming and consumer accounts — not SMS, which is vulnerable to SIM-swap. Roblox supports authenticator apps; enable it at Account Settings → Security → 2-Step Verification.
  2. Audit active sessions regularly. Roblox and most major platforms expose active session lists. Terminate any sessions you do not recognise immediately.
  3. Use isolated browser profiles for high-value sessions. A session cookie in a dedicated browser profile cannot be swept by infostealer malware running in your general-use profile.
  4. Be alert to phishing for malware delivery. The initial vector for cookie-stealing malware is nearly always phishing, malicious download, or trojanised software. Treat unexpected download prompts in gaming contexts with the same suspicion as enterprise phishing.

For security teams and platform operators:

  1. Implement device fingerprint binding for session tokens. If a session cookie is replayed from a different IP geolocation or device signature, require step-up authentication before granting access.
  2. Monitor for anomalous login telemetry. High-frequency account access from mismatched geolocations, user agents, or login timing that diverges from historical patterns are reliable signals of replayed stolen sessions.
  3. Apply HttpOnly and SameSite=Strict cookie attributes. While these do not stop malware that reads cookies from browser storage directly, they mitigate XSS-based cookie theft and cross-site request forgery.

Detection and Verification Checklist

  • Check active session logs on any high-value accounts; revoke anything not your current device.
  • Review browser extension permissions — malicious or compromised extensions are a common cookie-exfiltration path.
  • Scan endpoints with an up-to-date EDR for known infostealer indicators; LummaC2 and Vidar IOCs from CISA advisory AA25-141b are a good baseline.
  • For platform operators: verify cookie issuance policies enforce short-lived tokens (< 24h for high-privilege sessions) and server-side invalidation on logout.
  • Cross-reference any recent unfamiliar logins against known infostealer C2 ranges if you have DNS/proxy logging.

Sources: BleepingComputer, The Record (Recorded Future), dev.ua, UNN (Ukrainian National News)

For any query contact us at contact@cipherssecurity.com

Tags:

account hijackingcookie theftcredential theftcybercrimegaming securityRobloxsession hijackingUkraine

Share This Post:

Facebook Twitter LinkedIn Whatsapp Cloud Print Share via Email

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related Post




HOT CATEGORIES

STAY CONNECTED

  • 0
    Followers
    0
    Followers
  • 0.5K
    Followers
    0.5K
    Followers
  • 0.2K
    Subscribers
    0.2K
    Subscribers
  • 0.1K
    Count
    0.1K
    Count

POPULAR NEWS

Nmap Post Port Scans
THM Walkthrough

TryHackMe Walkthrough: Nmap Post Port Scans

May 11, 2024
How to install theHarvester tool
Tools

How to install theHarvester tool

December 14, 2022
TryHackMe Walkthrough: Nmap Advanced Port Scans
THM Walkthrough

TryHackMe Walkthrough: Nmap Advanced Port Scans

May 4, 2024

TAGS

cyber security ethical hacking footprinting information gathering ip address linux network news nmap Passive Information Gathering programming THM thm walkthrough tool walkthrough
Stylized logo for Ciphers Security
Ciphers Security, are here to provide you with the latest information and trends in the cybersecurity field.

Recent Posts

Nmap Post Port Scans

TryHackMe Walkthrough: Nmap Post Port Scans

How to install theHarvester tool

How to install theHarvester tool

TryHackMe Walkthrough: Nmap Advanced Port Scans 1

TryHackMe Walkthrough: Nmap Advanced Port Scans

Categories

  • "Tutorials"
  • "Vulnerability Analysis"
  • Algorithm
  • Blog
  • Cryptography
  • Cybersecurity
  • Cybersecurity News
  • Information Gathering
  • News
  • Programming
  • Scanning Network
  • Secure Development
  • THM Walkthrough
  • Tools
  • Vulnerability Analysis

Tags

cyber security ethical hacking footprinting information gathering ip address linux network news nmap Passive Information Gathering programming THM thm walkthrough tool walkthrough
© 2024 Ciphers Security. All Rights Reserved