- DontGetGot.
- Posts
- Warzone Malware & Hacking Genetic Data
Warzone Malware & Hacking Genetic Data
Cybercrime Rundown - 2/12

Rise and shine!
Welcome back to our newsletter, your beacon in the ever-evolving world of cybercrimes. Let's dive into another week of updates, insights, and strategies to stay ahead of the game.
Global Efforts Against Cyber Spying

Representatives from 35 nations and major tech firms like Google, Microsoft, and Meta convened to address the rampant misuse of cyber spying tools at a conference hosted by Britain and France. The joint statement emphasizes the urgent need for legal and responsible use of spyware, highlighting concerns over national security threats and human rights violations. Signatories pledged to enhance oversight, promote transparency with spyware vendors, and mitigate risks posed by unauthorized access to surveillance technology. The agreement comes amid heightened scrutiny following revelations about the misuse of spyware like NSO's Pegasus, prompting measures such as the United States' new visa restrictions targeting misuse of commercial spyware.
Genetic Data Hacked
The hack on 23andMe's database, orchestrated by a hacker known as Golem, shook the foundations of personal data security in autumn 2023. Golem, gained access to 6.9 million user profiles, specifically targeted individuals of Chinese & Jewish descent. The hacker offered tailored genetic data for sale, sparking concerns of antisemitic motivations behind the breach.
The compromised data, advertised with a graduated pricing scale, included intimate details such as ethnicity estimates, photographs, and links to potential relatives. Although the breach initially seemed ethnically targeted, cybersecurity analysts assert that the attack wasn't racially or ethnically driven, but rather a tactic to gain attention and profit in the criminal underworld. The incident prompted widespread concern about the safety of genetic data online and its potential misuse in targeting individuals based on their ethnic heritage.
“Warzone Malware” Arrests

In a cybercrime crackdown, the US has dismantled the notorious Windows-based malware strain known as "Warzone". The Justice Department, in collaboration with international law enforcement, seized the main website selling the malware, warzone.ws, along with three associated domains. Two individuals allegedly involved in selling the malware to cybercriminals have been arrested: Daniel Meli, also known as 'xVulnerable,' was apprehended in Malta, while Prince Onyeoziri Odinakachi was nabbed in Nigeria.
Warzone, openly marketed on the internet for $37.95 per month, functioned as a remote access Trojan, granting attackers control over Windows PCs. The malware's capabilities included accessing web cameras, stealing browser passwords, and downloading additional files. Daniel Meli, believed to have operated under the alias "xVulnerable," purportedly boasted a client base of over 500 individuals, offering malware products and services since at least 2012. Meli's involvement in developing remote access Trojans is alleged, although it remains unclear whether he created the Warzone malware or merely distributed it. Prince Onyeoziri Odinakachi provided online customer support for Warzone users, with federal authorities tracing the investigation back to computer infections in Massachusetts and covertly purchasing and analyzing the Warzone RAT malware. If convicted, both suspects face significant prison sentences.
That’s the rundown for this week!
We're committed to improving your experience with each edition. Your thoughts matter! Please take a moment to share your feedback and suggestions with us. Together, we can make our newsletter even better. Thank you for your continued support and engagement!
What's your opinion of "Don't Get Got" ? |
Stay cautious & Don't Get Got
P.S. Your experiences matter. If you've encountered a scam or have insights to share, we invite you to connect with us. Let's build a community that stands against cyber threats.