Thursday, February 27, 2025
HomeCyber Crime'Black Panthers' - A SIM Swap Gang Connected With Dark Web Got...

‘Black Panthers’ – A SIM Swap Gang Connected With Dark Web Got Arrested

Published on

SIEM as a Service

Follow Us on Google News

Spanish National Police arrested the notorious SIM-swapping gang operating under the name “Black Panthers” for various cyber crimes.

The law enforcement agents arrested 55 people, including the leader heading this Black Panthers gang.

The operators behind this Black Panthers committed the bank scams through SIM swapping attacks with other methods such as social engineering techniques, VishingPhishing, or Carding to call forwarding.

There 100s of victims got scammed and this group stole around 250,000 euros.

“The investigation -which has made it possible to detect some 100 victims and a fraud amounting to 250,000 euros distributed throughout the national territory- has ended with the arrest of 55 people of different nationalities.”

Criminals Network Structure

The criminal gang formed a well structure network and each division employed the respective skill, accessibility to stolen information, and experience.

The group used various techniques such as phishing, fishing, and call forwarding techniques to create duplicate SIM cards using the SIM Swapping technique.

Once they successfully swapped the SIM card they took control of the electronic banking of their victims and made fraudulent transfers to a network.

The Combined attack allowed them to access the funds in the victims’ accounts, which they had until the existing balance was exhausted.

“The solvency with which the criminal organization acted against the companies was such that they got in touch with their local distributors, posing as the technical service of their platform, to steal the user credentials of the employees.”

Bought Cards from Dark Web

As a result ” This gave them access to the database of the telephone operators themselves and allowed them to obtain the personal data of the victims, making duplicate SIM cards themselves.” Spanish police said in a press release report.

Enforcement officials found that the organization also used members of a second action cell specialized in committing fraud through carding (cloning bank cards) and obtaining personal information through social engineering.

Also, the group bought ID and credit card numbers through various black markets on the Dark Web using cryptocurrencies and successfully cloned cards used to buy purchase luxury products and also get delivered by displaying the physical ID cards stolen or purchased on black markets.

Police have carried out seven home searches in which a hardware-type cryptocurrency portfolio, 45 SIM cards, 11 mobile phones, 4 laptops, a high-end vehicle and abundant documentation related to the facts investigated have been involved.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...