> Back to All Posts

Teen Ran Infostealer Malware That Stole 28,000 Accounts

Infostealer malware

An 18-year-old from Odesa, Ukraine, has been identified as a key operator behind an infostealer malware campaign that compromised tens of thousands of online shoppers in the United States. Ukrainian cyberpolice, working alongside U.S. law enforcement, linked the suspect to attacks that ran throughout 2024 and into 2025 — draining credentials, hijacking accounts, and generating hundreds of thousands of dollars in fraudulent purchases.

What the Investigation Uncovered

The operation targeted customers of an online store based in California. Over the course of the campaign, attackers gained unauthorized access to more than 28,000 customer accounts. Of those, 5,800 were actively used to place fraudulent orders worth approximately $721,000. Direct financial losses, including chargebacks, exceeded $250,000 — roughly 11 million Ukrainian hryvnias.

The 18-year-old suspect is accused of administering the online infrastructure used to process, distribute, and monetize stolen data. He also engaged in cryptocurrency transactions with accomplices as part of the scheme’s financial operations. Ukrainian law enforcement conducted searches at his residence on May 12, seizing computer equipment and mobile phones.

How Infostealer Malware Works

Infostealer malware is designed to run silently on infected devices and harvest sensitive data before the victim has any idea something is wrong. It targets browser-stored passwords, saved payment details, authentication cookies, session tokens, and sometimes cryptocurrency wallet data. Everything collected gets transmitted to servers controlled by the attacker.

In this case, the stolen data was processed and sold through specialized underground platforms and Telegram bots — a common distribution channel in cybercrime communities. Buyers can purchase credential packages and use them almost immediately for account takeovers or resale.

The malware in this operation specifically collected session data, and that detail matters. Session tokens are what keep you logged into a site after you enter your password. If an attacker steals a valid session token, they can access the victim’s account without knowing the password at all. In many cases, this also bypasses multi-factor authentication, since the site treats the token as proof the login already happened.

Why Session Token Theft Is So Dangerous

Most people treat MFA as a reliable last line of defense. Add a second factor — a code, an app prompt, a hardware key — and even a stolen password becomes useless. Session token theft breaks that assumption entirely.

When an infostealer grabs a live session token, the attacker essentially walks in through a door that was already open. The authentication step has already passed. The site has no reason to ask for a second factor again. This is why credential theft operations that prioritize session data are considerably more damaging than those that only collect passwords.

It also means that changing a password after an infection may not be enough. If a session token was stolen and is still valid, the attacker retains access until that session expires or gets revoked manually.

A Cross-Border Operation With Real-World Consequences

This case involved cooperation between Ukrainian cyberpolice and U.S. authorities — a reminder that cybercrime investigations increasingly depend on international coordination. The suspect’s location in Ukraine did not shield him from scrutiny, and the joint effort led directly to the searches and the identification of the infrastructure he managed.

The financial scale of the operation also deserves attention. Over $720,000 in fraudulent purchases tied to a single campaign run partly by a teenager points to just how accessible and profitable infostealer malware has become. Tools like these are widely available in underground markets, often rented or purchased outright with minimal technical knowledge required.

For the thousands of victims whose accounts were compromised, the damage ranged from fraudulent charges to the exposure of personal data they likely assumed was secure.

Final Thoughts

The Odesa case puts a concrete face on a threat that often feels abstract. Infostealer malware does not rely on elaborate hacking techniques or zero-day exploits. It quietly collects what is already stored on your device and sends it to whoever is running the operation. The scale here — 28,000 accounts, over $700,000 in fraudulent purchases — came from a relatively simple but well-organized scheme.

For anyone shopping online, the practical takeaway is straightforward. Keep devices clean with up-to-date security software, be cautious about what you install, and if you suspect a compromise, revoke active sessions — not just passwords. A stolen session token can outlast a password reset, and attackers know it.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.