Wednesday, May 7, 2025
HomeCyber Crime'Black Panthers' - A SIM Swap Gang Connected With Dark Web Got...

‘Black Panthers’ – A SIM Swap Gang Connected With Dark Web Got Arrested

Published on

SIEM as a Service

Follow Us on Google News

Spanish National Police arrested the notorious SIM-swapping gang operating under the name “Black Panthers” for various cyber crimes.

The law enforcement agents arrested 55 people, including the leader heading this Black Panthers gang.

The operators behind this Black Panthers committed the bank scams through SIM swapping attacks with other methods such as social engineering techniques, VishingPhishing, or Carding to call forwarding.

- Advertisement - Google News

There 100s of victims got scammed and this group stole around 250,000 euros.

“The investigation -which has made it possible to detect some 100 victims and a fraud amounting to 250,000 euros distributed throughout the national territory- has ended with the arrest of 55 people of different nationalities.”

Criminals Network Structure

The criminal gang formed a well structure network and each division employed the respective skill, accessibility to stolen information, and experience.

The group used various techniques such as phishing, fishing, and call forwarding techniques to create duplicate SIM cards using the SIM Swapping technique.

Once they successfully swapped the SIM card they took control of the electronic banking of their victims and made fraudulent transfers to a network.

The Combined attack allowed them to access the funds in the victims’ accounts, which they had until the existing balance was exhausted.

“The solvency with which the criminal organization acted against the companies was such that they got in touch with their local distributors, posing as the technical service of their platform, to steal the user credentials of the employees.”

Bought Cards from Dark Web

As a result ” This gave them access to the database of the telephone operators themselves and allowed them to obtain the personal data of the victims, making duplicate SIM cards themselves.” Spanish police said in a press release report.

Enforcement officials found that the organization also used members of a second action cell specialized in committing fraud through carding (cloning bank cards) and obtaining personal information through social engineering.

Also, the group bought ID and credit card numbers through various black markets on the Dark Web using cryptocurrencies and successfully cloned cards used to buy purchase luxury products and also get delivered by displaying the physical ID cards stolen or purchased on black markets.

Police have carried out seven home searches in which a hardware-type cryptocurrency portfolio, 45 SIM cards, 11 mobile phones, 4 laptops, a high-end vehicle and abundant documentation related to the facts investigated have been involved.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...