News

Feds arrest Romanian malware actors behind CyberSeal and Dataprotector

In a joint effort led by international law enforcement agencies, including the U.S. FBI, Europol, and the Romanian police, a Romanian hacker duo has been arrested for selling malware encryption tools.

These tools were used by cyberthreat actors to evade detection by making it hard for antivirus and endpoint security products to detect their malware.

“These services have been purchased by more than 1560 criminals and used for crypting several different type of malware, including Remote Access Trojans [(RATs)], information stealers, and ransomware,” stated Europol’s press release.

The duo has also been accused of selling access to a “Cyberscan service” for US$7-40, that allowed their clients to test their malware strand against antivirus programs until their malware became “fully undetectable (FUD).”

“Their clients paid between US$40 [and] US$300 for these crypting services, depending on licence conditions. Their service activity was well structured and offered regular updates and customer support to the clients,” says Europol.

While the CyberSeal site has been taken down by authorities, Security Report can confirm the site indeed had crypter (“protector”) and FUD services listed at varying prices, with a lifetime license costing US$150.

Image: Cyber-Seal Protector site with variable licenses and pricing
Source: Security Report News

Likewise, Security Report News observed now-shutdown domains selling DataProtector crypter access.

DataProtector website, now taken down, was selling FUD exploits, and illicit materials
Source: Security Report News

Services like crypters and counter malware testing, as provided by the duo, have been offered on underground markets since at least 2010.

Image: How malware encryption tools (‘crypters’) work
via Europol

Law enforcement agencies including the U.S. FBI, Romanian Police (Poliția Română, the Australian Federal Police (AFP), the Norwegian National Criminal Investigation Service (Kripos), and Europol were involved in the operation.

As a part of this investigation, in addition to arresting the hacker duo, the agencies carried out 4 house searches in Bucharest and Craiova (Romania), in addition to taking down the backend infrastructure that powered the ‘crypter’ services, in Romania, Norway, and the U.S.

Earlier this year, an Italian company was found to be selling similar “malware protector” services that aided GuLoader threat actors in conducting their malicious activities.

Ax Sharma

Ax Sharma is a UK-based security researcher, journalist and TV subject matter expert experienced in malware analysis and cybercrime investigations. His areas of interest include open source software security and threat intel analysis. Frequently featured by leading media outlets like the BBC, Channel 5, Fortune, WIRED, The Register, among others, Ax is an active community member of the OWASP Foundation and the British Association of Journalists (BAJ).

Recent Posts

8 Brutal Truths About Cybersecurity I Wish I Knew

When I first got into cybersecurity, I thought it was all about hackers in hoodies…

10 hours ago

US Air Force Probes Potential SharePoint-Linked Privacy Breach

The US Air Force is investigating a “privacy-related issue” that may have exposed personally identifiable…

2 days ago

Harrods third-party breach exposes 430,000 customer records, hackers reach out

London’s iconic department store Harrods has disclosed that approximately 430,000 customer records were compromised in…

4 days ago

WestJet confirms customer ID, passports stolen in June cyberattack

WestJet confirmed that in a June 2025 cybersecurity incident, a “sophisticated, criminal third party” gained…

4 days ago

Did You Also Get a ‘Real’ Phishing Email From GitHub.com?

Imagine getting an email straight from GitHub’s own notification system: the same one you've trusted…

7 days ago

World’s Largest Supply Chain Cyber Attack… And just 5 Cents Stolen?

You probably saw the headlines: the world’s largest npm supply chain attack, chalk and debug-js…

1 week ago

This website uses cookies.