Security & Infrastructure Tools
Hackers arrested for hijacking and selling 610,000 Roblox accounts
Ukrainian police in Lviv arrested three hackers who hijacked over 610,000 Roblox accounts and sold them for about $225,000. The operation, led by a 19-year-old, used credential-stealing malware disguised as a game-enhancer to target high-value accounts, with ten searches yielding cash and electronic evidence. The suspects, aged 19, 21, and 22, face up to 15 years in prison on theft and unauthorized IT interference charges, as investigations continue.

Hackers Arrested for Hijacking and Selling 610,000 Roblox Accounts
OverviewA joint crackdown in Ukraine led to the disruption of a large cybercrime operation targeting Roblox accounts. In a coordinated effort by the Lviv region police, the Cyber Police, and the Security Service of Ukraine, three individuals were detained in connection with hijacking more than 610,000 Roblox user accounts and selling them for profit. The investigation, which spanned several months, also uncovered a disciplined scheme that categorized stolen accounts by value and Loot balance before moving them to illicit markets.
The Operation and Seizures
- The authorities conducted ten targeted searches at locations tied to the group.
- Cash seizures amounting to approximately $35,000 were made, alongside a collection of electronic devices: 37 mobile phones, 11 desktop computers, seven laptops, five tablets, and four USB drives.
- The operation aimed to disrupt both the theft of accounts and the broader pipeline used to monetize the stolen assets.
- While the game platform was not officially named in every official statement, Prosecutor General’s Office disclosures confirmed the focus on Roblox accounts, which are used for creating, playing, and trading within the Roblox ecosystem.
The Suspects
- The group was led by a 19-year-old, who recruited two accomplices aged 21 and 22 via gaming forums.
- The young leader organized the campaign, delegating tasks and coordinating the sale of compromised accounts.
- The trio operated across multiple leveraged channels, combining social engineering, malware delivery, and exploitation of stored credentials to gain access to user accounts.
How the Hack Worked
- The core tactic involved distributing a credential-stealing tool disguised as a legitimate game-enhancer application.
- Victims were lured into installing what appeared to be a harmless add-on, which then harvested login credentials from their devices.
- Once access was obtained, the attackers categorized stolen Roblox accounts by factors such as account value, inventory rarity, and remaining Robux balances before moving them to illicit markets.
The Value and Market for Stolen Accounts
- Of the 610,000 accounts compromised, authorities identified at least 357 as high-value or “elite” accounts.
- High-value accounts typically contained substantial Robux, rare or limited-edition items, and long histories of in-game progress, making them particularly attractive on the dark market.
- The stolen accounts were sold through a Russian website and through closed online communities, where buyers sought premium assets and premium access.
Legal Actions and Charges
- The suspects face charges under two statutes: theft (Article 185) and unauthorized interference with IT systems (Article 361).
- Maximum penalties on these charges can reach up to 15 years of imprisonment.
- Prosecutors noted the seriousness of intrusions into digital property that also carry financial value beyond the gaming realm.
Victim Impact and Account Value
- Roblox accounts served as both gaming assets and digital storefronts, often linked to significant in-game currency and purchased items.
- The theft not only deprived users of access but also stripped away accumulated assets, purchases, and potential income tied to their accounts.
- The case underscores the financial dimension of account hijacking, where high-value profiles can be monetized through illicit resale.
Ongoing Investigation and Next Steps
- Investigations continue to identify potential additional accomplices and to locate more victims affected by the scheme.
- Authorities aim to map the full scale of the operation, including all channels used to distribute stolen accounts and any further buyers on closed networks.
Timeline and Context
- The hacking activity occurred over a multi-month window, with unauthorized access and exploitation taking place between October 2025 and January 2026.
- The subsequent arrests and seizures were part of an ongoing effort to dismantle the operation and disrupt the flow of stolen Roblox assets.
- Authorities emphasize the broader risk posed by credential theft and malware disguised as legitimate software, which can compromise a wide range of online platforms beyond Roblox.
Key Takeaways
- A large-scale credential theft operation targeted a popular gaming platform, demonstrating how game accounts can function as valuable digital assets.
- The combination of malware delivery, credential harvesting, and market-based sales illustrates a tightly organized crime at scale.
- Legal frameworks in multiple jurisdictions address both theft of digital property and unauthorized interference with information systems, with substantial penalties for offenders.
- The case highlights the importance of safeguarding login credentials and remaining vigilant against seemingly benign software promising enhancements to gaming experiences.
Timeline Snapshot (Key Facts)
- October 2025 to January 2026: Operation hijacked over 610,000 Roblox accounts, with a subset identified as high-value.
- 2026 (April): Law enforcement actions included ten targeted searches and the seizure of cash and electronic devices.
- Ongoing: Investigations continue to identify additional accomplices and victims, and to map the full extent of the illicit network.