Friday, November 15, 2024
HomeCyber CrimeSpain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Published on

Law enforcement officials have successfully apprehended a notorious criminal organization responsible for perpetrating computer scams and stealing sensitive data belonging to more than four million individuals.

Law enforcement officials arrested a criminal organization consisting of 34 cybercriminals. During the operation, authorities conducted 16 searches in various towns and seized several items, including two simulated firearms, a katana, a basketball, 80,000 euros in cash, four high-end vehicles, a database containing information on 4 million individuals, a computer, and electronic equipment worth thousands of euros.

Close to €3 million was illegally obtained by the group through various fraudulent means such as smishing, phishing, vishing, the son-in-distress scam, manipulation of technology company delivery notes, and pretending to be employees of an electricity supply company while engaging in vishing campaigns.

- Advertisement - SIEM as a Service

Spoofing Techniques

Smishing: Smishing is a text message tricking recipients into clicking a link or sending private information to an attacker.

Phishing: Phishing is a social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.

Vishing: Vishing is a phone scam to steal confidential information from individuals or organizations.

Cryptocurrency assets were purchased by the leaders of the network using their profits. They also created fake documentation and used spoofing techniques to conceal their identities.

A specialized agent from the Central Cybercrime Unit conducted an investigation and discovered a criminal network that had unlawfully accessed the databases of several financial and credit institutions.

The network had deposited varying sums of money from the credit institution into their customers’ accounts.

Various banks’ identities were impersonated in vishing campaigns, while electricity supply companies’ identities were used in phishing campaigns, along with the ‘son in distress’ scam. The information was utilized for these purposes.

The organization’s fraudulent scheme consisted of rerouting the products obtained from suppliers towards the organization itself, effectively sidestepping the intended recipient company that had purchased the computer and electronic goods.

The main leaders of the network have been arrested, and over 1,000 complaints have been resolved, with the possibility of identifying more perpetrators and victims.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...