Para garantizar la mejor experiencia de navegación, active JavaScript en su navegador web. Sin él, muchas funciones del sitio web no estarán disponibles.


Total de pruebas:

La policía española detiene a un hombre por presuntamente reservar habitaciones de hotel de lujo por un centavo.

19 de febrero de 2026

Lea también: Holandés detenido por intento de extorsión a la policía por una filtración de datos, detenido en Polonia un presunto afiliado del ransomware Phobos, y más.

Vistas: 5.1k Tiempo de lectura:4 min.

La policía española detiene a un hombre por presuntamente reservar habitaciones de hotel de lujo por un centavo.

Spanish police arrest a man for allegedly booking luxury hotel rooms for one cent

Spanish police have arrested a 20-year-old man accused of hacking a hotel booking website to reserve luxury rooms for as little as one cent. According to police, the suspect allegedly altered the validation process of an electronic payment platform, which made bookings appear fully paid, when in fact only one cent was charged for rooms costing up to €1,000 ($1,500) per night.

El hombre, de nacionalidad española, también es acusado de consumir artículos del minibar durante sus estancias y de dejar ocasionalmente facturas adicionales sin pagar. En el momento de su detención, se alojaba en un hotel de lujo en Madrid con una reserva de cuatro noches que totalizaba 4.000 €. Las autoridades señalaron que se había alojado en el mismo hotel en múltiples ocasiones, causando pérdidas que superaban los 20.000 €.

La investigación comenzó a principios de este mes después de que una plataforma de reservas en línea reportara actividad sospechosa. Aunque inicialmente las transacciones parecían haberse realizado correctamente, se detectaron irregularidades días más tarde cuando la plataforma de pago transfirió a la empresa afectada los importes realmente recibidos.

Un holandés detenido por presunta extorsión a la policía

Dutch authorities have arrested a 40-year-old man from Ridderkerk on suspicion of computer hacking and attempted extortion of the local police force.

The suspect was taken into custody after he allegedly accessed and downloaded confidential police documents due to an internal police error. Officers later searched his home and seized data storage devices to secure the sensitive files and prevent their possible distribution.

Según la policía, el incidente comenzó el 12 de febrero, cuando el hombre contactó a las autoridades en relación con otra investigación en curso. Afirmó poseer imágenes que podrían ser relevantes para el caso. Un agente le envió un enlace destinado a subir el material. Sin embargo, debido a un error, el hombre recibió un enlace de descarga en su lugar, lo cual le otorgó acceso a archivos policiales confidenciales.

The man proceeded to download the documents. When police realized the error, they instructed him to stop and delete the files. He allegedly refused, saying he would only comply if he “received something in return.”

Authorities say the demand prompted the decision to arrest him on suspicion of computer intrusion and extortion. Police have since reported the data breach internally and launched an investigation into both the security lapse and the suspect’s actions. Officials said that the arrest was necessary to recover the confidential information and to prevent further dissemination of sensitive material. The investigation remains ongoing.

Suspected Phobos ransomware affiliate arrested in Poland

Polish authorities have detained a 47-year-old man suspected of being involved in the Phobos ransomware activities and seized electronic devices containing stolen data. Officers from Poland’s Central Bureau of Cybercrime Control (CBZC) arrested the suspect in the Małopolska region during a joint operation involving units from Katowice and Kielce. The action was carried out as part of “Operation Aether,” an international law enforcement effort coordinated by Europol targeting the infrastructure and affiliates of the Phobos ransomware network.

During a search of the suspect’s home, police found computers and mobile phones containing files with login credentials, passwords, credit card numbers, and server IP addresses. Authorities also determined that the suspect allegedly communicated with members of the Phobos group using encrypted messaging applications.

The man now faces charges under Article 269b of Poland’s Criminal Code for producing, acquiring, and distributing software designed to unlawfully obtain information from computer systems. If convicted, he faces up to five years in prison.

Phobos es una operación de larga data de ransomware-as-a-service (RaaS) considerada una evolución de la familia de malware Crysis (Dharma). Aunque es menos conocida públicamente, sigue siendo una de las más prolíficas. En particular, entre mayo y noviembre de 2024, Phobos representó aproximadamente el 11 % de las envíos al servicio de seguimiento ID Ransomware. Las autoridades de EE. UU. han vinculado anteriormente al grupo con brechas en más de 1.000 organizaciones públicas y privadas a nivel mundial, con pagos de rescate que superan los 16 millones de dólares.

Operation Aether has targeted individuals across multiple levels of the Phobos network, including backend infrastructure operators and affiliates responsible for network intrusions and data encryption. In February 2025, four European hackers were arrested as part of a joint effort by Thai, Swiss, and US authorities in connection to Phobos, and the US Department of Justice charged two Russian nationals for operating the ransomware.

En noviembre de 2024, un presunto administrador de Phobos fue extraditado a Estados Unidos. Otro presunto afiliado de Phobos fue detenido en Italia en 2023.

Boletín informativo de ImmuniWeb

Get Cybercrime Weekly, invitations to our events and webinars in your inbox:


Privado y confidencialSus datos permanecerán privados y confidenciales.

La policía ucraniana detiene a dos hombres por un fraude hospitalario de 115 000 dólares

Ukrainian cyberpolice have detained two men suspected of stealing more than $115,000 in government funds from a local hospital in the Sumy region.

According to the authorities, the suspects gained unauthorized access to a hospital accountant’s computer by using remote administration software. This allowed them to interfere in the hospital’s financial operations and illegally transfer budget funds to accounts linked to their own company.

After examining digital evidence and financial transactions, police officers identified the alleged perpetrators as two residents of the Volyn region, aged 45 and 40. Law enforcement officials said that nearly 4.98 million hryvnias (approximately $115,000) were transferred to the account of a limited liability company owned by one of the suspects.

During the pre-trial investigation, police conducted five court-authorized searches at the suspects’ residences. Officers seized computer equipment, mobile phones, data storage devices, bank cards, cash, and other items.

The two men have been formally notified of suspicion on charges of unauthorized interference in information systems and large-scale theft under Ukraine’s Criminal Code. Authorities are currently deciding on preventive measures for the suspects as the investigation continues.

ImmuniWeb puede ayudarle a prevenir brechas de datos y cumplir con los requisitos normativos.

A phisher sentenced to 8 years for $1.3M tax fraud involving Warzone RAT

A Nigerian national who had been living in Mexico was sentenced in the United States for orchestrating a years-long scheme to hack tax preparation firms and file fraudulent tax returns. Matthew A. Akande, 37, was sentenced to eight years in prison, followed by three years of supervised release. He was also ordered to pay over $1,3 million in restitution.

Akande was arrested in October 2024 at Heathrow Airport in the UK at the request of the United States. He was extradited to the US on March 5, 2025. A federal grand jury indicted him in July 2022 on multiple charges, including conspiracy to obtain unauthorized access to protected computers in furtherance of fraud, wire fraud, theft of government money, and aggravated identity theft.

According to court documents, between June 2016 and June 2021, Akande and his co-conspirators stole taxpayers’ personally identifiable information (PII) and used it to file fraudulent tax returns seeking refunds from the Internal Revenue Service.

El esquema se dirigió a cinco empresas de preparación de impuestos en Massachusetts. Akande era responsable de enviar correos electrónicos de phishing haciéndose pasar por posibles clientes que buscaban servicios fiscales. Estos correos estaban diseñados para inducir a los destinatarios a descargar malware de acceso remoto, incluido Warzone RAT.

Once installed, the malware allowed Akande to access sensitive client data, including prior-year tax information. He then used the information to file fraudulent returns directing refunds to bank accounts opened by co-conspirators in the US. The funds were then withdrawn in cash and partially transferred to third parties in Mexico at Akande’s direction, with accomplices keeping a share.

Prosecutors said Akande and his associates filed more than 1,000 fraudulent tax returns over approximately five years, seeking more than $8.1 million in refunds. Authorities said the scheme netted more than $1.3 million in fraudulent tax refunds before it was uncovered.

Próximos pasos:

Hable con un experto