LIVE NEWSROOM · --:-- · May 23, 2026
A LIBRARY FOR SECURITY RESEARCHERS

Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft

Post on X LinkedIn
Ukrainian Police Arrest Three for Hijacking 610,000 Roblox Accounts via Cookie Theft

Ukrainian cyber police have arrested three individuals who used cookie-harvesting malware to compromise more than 610,000 Roblox gaming accounts between October 2025 and January 2026, selling high-value accounts on Russian-language platforms and pocketing approximately UAH 10 million (~$225,000 USD) paid in cryptocurrency.

// 01 Roblox Account Hijacking: What We Know So Far

The operation was run out of Lviv by a 19-year-old organiser who recruited two accomplices aged 21 and 22. Rather than cracking passwords, the attackers deployed malicious software that harvested browser session cookies, allowing them to authenticate to victim accounts without needing credentials at all — a technique that bypasses passwords, SMS OTPs, and many 2FA implementations tied to the password-reset flow.

Over the four-month campaign, the group checked over 610,000 accounts for valuable in-game items and Robux balances. Investigators found 357 files containing selected high-value accounts at the time of arrest. The accounts were listed for sale on Russian-language marketplace platforms, with buyers paying through cryptocurrency wallets — a pattern investigators say is consistent with a for-profit credential resale operation rather than targeted espionage.

Law enforcement executed 10 search warrants across residences and registered addresses. Seized items included computer equipment, storage devices, mobile phones, bank cards, physical notes documenting the operation, more than €2,500 in cash, and approximately $35,000 USD.

The Lviv region Cyber Police and prosecutors led the investigation. Criminal proceedings are underway; charges have not yet been publicly confirmed, but Ukrainian law covers unauthorised access to computer systems, theft, and money laundering via cryptocurrency.

Secondary reporting from The Record (Recorded Future) confirms Ukrainian authorities classified this as a significant organised cybercrime operation rather than an isolated incident.

// 02 Why Roblox Account Hijacking Matters Beyond Gaming

For security practitioners, this arrest is a case study in the ongoing scalability of cookie-based session hijacking — an attack that has become one of the most effective credential theft vectors precisely because it sidesteps the password-centric defenses most organisations have invested in.

Platforms like Roblox are attractive targets not just for their user base, but because in-game economies are liquid and largely pseudonymous. Digital items and currency convert quickly to real money through grey-market trading sites, many of which operate from jurisdictions with limited cooperation on cybercrime extradition. The Russian-platform sales channel in this case adds an additional layer of operational insulation.

The same technique scales to higher-value targets. Infostealer malware families — including Redline, LummaC2, and Vidar — harvest session cookies from browsers as a core function. Enterprise SSO tokens, cloud provider sessions, and SaaS application cookies stored in browser profiles are exfiltrated by the same mechanisms used here against Roblox players. The difference between a stolen Roblox cookie and a stolen AWS console session token is the size of the blast radius.

// 03 Roblox Account Hijacking: What You Should Do Now

For individual users and organisations running platforms with in-game economies:

  1. Enable authenticator-app 2FA on gaming and consumer accounts — not SMS, which is vulnerable to SIM-swap. Roblox supports authenticator apps; enable it at Account Settings → Security → 2-Step Verification.
  2. Audit active sessions regularly. Roblox and most major platforms expose active session lists. Terminate any sessions you do not recognise immediately.
  3. Use isolated browser profiles for high-value sessions. A session cookie in a dedicated browser profile cannot be swept by infostealer malware running in your general-use profile.
  4. Be alert to phishing for malware delivery. The initial vector for cookie-stealing malware is nearly always phishing, malicious download, or trojanised software. Treat unexpected download prompts in gaming contexts with the same suspicion as enterprise phishing.

For security teams and platform operators:

  1. Implement device fingerprint binding for session tokens. If a session cookie is replayed from a different IP geolocation or device signature, require step-up authentication before granting access.
  2. Monitor for anomalous login telemetry. High-frequency account access from mismatched geolocations, user agents, or login timing that diverges from historical patterns are reliable signals of replayed stolen sessions.
  3. Apply HttpOnly and SameSite=Strict cookie attributes. While these do not stop malware that reads cookies from browser storage directly, they mitigate XSS-based cookie theft and cross-site request forgery.

// 04 Detection and Verification Checklist

  • Check active session logs on any high-value accounts; revoke anything not your current device.
  • Review browser extension permissions — malicious or compromised extensions are a common cookie-exfiltration path.
  • Scan endpoints with an up-to-date EDR for known infostealer indicators; LummaC2 and Vidar IOCs from CISA advisory AA25-141b are a good baseline.
  • For platform operators: verify cookie issuance policies enforce short-lived tokens (< 24h for high-privilege sessions) and server-side invalidation on logout.
  • Cross-reference any recent unfamiliar logins against known infostealer C2 ranges if you have DNS/proxy logging.

Sources: BleepingComputer, The Record (Recorded Future), dev.ua, UNN (Ukrainian National News)

For any query contact us at contact@cipherssecurity.com

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous Sandhills Medical Ransomware Breach Exposes 169,017 Patients' PHI Next 12 Allied Agencies Warn: China-Nexus Actors Are Building Covert Botnets from Your Routers and Cameras

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top
    Ad