Friday, February 21, 2025
HomeCyber Security NewsAuthorities Dismantled Hackers Who Stolen Millions Using AirBnB

Authorities Dismantled Hackers Who Stolen Millions Using AirBnB

Published on

SIEM as a Service

Follow Us on Google News

An international cybercrime network responsible for stealing millions of euros across at least ten European countries has been dismantled in a joint operation by the Rotterdam Police Cybercrime Team and the Belgian police.

The sophisticated criminal group employed phishing schemes and bank helpdesk fraud to exploit vulnerable victims, with call centers set up in luxury residential towers and Airbnb properties.

Coordinated Raids and Arrests

On Tuesday, December 3, police conducted coordinated raids in multiple Dutch cities, including Zaltbommel, Almere, Amersfoort, ‘s-Hertogenbosch, and Rotterdam. The operation resulted in the arrest of four suspects: three men and a woman, aged 23 to 66.

Authorities seized data carriers, telecommunication devices, large sums of cash, designer clothing, expensive watches, and other high-value items, underscoring the lavish lifestyles funded by their criminal activity.

While three suspects remain in custody, the 66-year-old woman was released but remains a suspect in the case.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Belgian authorities arrested five additional suspects, one of whom is set to be extradited to the Netherlands via an international arrest warrant.

The Dutch Public Prosecution Service confirmed that victims across Europe were targeted, using fraudulent emails, text messages, and WhatsApp communications to lure them into providing sensitive financial information.

The group allegedly utilized phishing links to redirect victims to fake banking websites, where their personal and financial data were stolen. Posing as “anti-fraud team” or “bank employees,” the suspects manipulated victims into believing their accounts had been compromised.

In reality, these “helpful” fraudsters emptied the accounts instead, stealing millions of euros.“The suspects called victims from luxury Airbnb locations and operated lavish call centers.

They left victims heartbroken and destitute,” stated Jacqueline Bonnes, public prosecutor in Rotterdam.

The stolen funds were used to finance extravagant lifestyles. According to Jan van der Linden, Cybercrime Team Leader, the suspects flaunted their wealth on social media, posing with celebrities, designer clothes, luxury cars, and exotic vacations.

“These fraudsters showed no compassion. They manipulated people, cursing them when scams didn’t succeed. Victims, including vulnerable elderly individuals, were left emotionally and financially devastated,” he said.

In response to the growing allure of cybercrime—particularly among young people—the Dutch police have launched an awareness campaign titled “Selfmade? Cellmate!” The campaign, featured on social media platforms like YouTube, Snapchat, and TikTok, aims to deter youth from glamorizing cybercrime.

“Criminal influencers glorify this lifestyle, but the reality is that victims suffer deeply. We must remind everyone: what if the victim is your mother?” said Ruben van Well, Cybercrime Team Account Manager.

Investigate Real-World Malicious Links,Malware & Phishing Attacks With ANY.RUN - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...