Trend Micro uncovers dangerous new 'hackers for hire' Void Balaur

artistic representation of a hacker
(Image credit: Shutterstock)

Cybersecurity researchers have shared comprehensive insight into a prolific hacker-for-hire group that have targeted at least 3,500 individuals and organizations and have been operational since 2015.

The cybercriminals, uncovered by Trend Micro, which named the group Void Balaur, are said to advertise their services under the Rockethack moniker on Russian-language forums.

According to the researchers, Void Balaur’s services include cracking email and social media accounts, and selling sensitive personal and financial information about targets.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“Cyber mercenaries [are] an unfortunate consequence of today's vast cybercrime economy. Given the insatiable demand for their services and harboring of some actors by nation-states, they're unlikely to go away anytime soon,” opined Feike Hacquebord, senior threat researcher for Trend Micro.

Cyber thugs

According to the researchers, the cyber mercenaries charge anywhere between $20 for a stolen credit card history to over $800 for phone call records with cell tower locations.

Perusing through their targets, which span the globe, the researchers note that the gang has targeted organizations known to store highly sensitive and potentially lucrative information, such as telecommunications companies, ATM machine vendors, financial services companies, medical insurers, and even IVF clinics. 

Besides organizations, the group has also been observed to attack individuals such as journalists, human rights activists, politicians, scientists, doctors, telco engineers, and cryptocurrency users.

Commenting on their tactics, the researchers note that Void Balaur often relies on email phishing along with info-stealing malware such as Z*Stealer or DroidWatcher, to achieve its nefarious goals.

Trend Micro believes that comprehensive reports such as the one it has collated is the best form of defense against threat actors such as Void Balaur

Defend yourself against threat actors like Void Balaur by protecting your accounts with security keys, and encrypting all your data and communications.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
Flags of Iran, China, Russia and North Korea on a wall. China North Korea Iran Russia alliance
Cybercrime is helping fund rogue nations across the world - and it's only going to get worse, Google warns
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)