Thursday, December 5, 2024
HomeCyber Crime'Black Panthers' - A SIM Swap Gang Connected With Dark Web Got...

‘Black Panthers’ – A SIM Swap Gang Connected With Dark Web Got Arrested

Published on

SIEM as a Service

Spanish National Police arrested the notorious SIM-swapping gang operating under the name “Black Panthers” for various cyber crimes.

The law enforcement agents arrested 55 people, including the leader heading this Black Panthers gang.

The operators behind this Black Panthers committed the bank scams through SIM swapping attacks with other methods such as social engineering techniques, VishingPhishing, or Carding to call forwarding.

- Advertisement - SIEM as a Service

There 100s of victims got scammed and this group stole around 250,000 euros.

“The investigation -which has made it possible to detect some 100 victims and a fraud amounting to 250,000 euros distributed throughout the national territory- has ended with the arrest of 55 people of different nationalities.”

Criminals Network Structure

The criminal gang formed a well structure network and each division employed the respective skill, accessibility to stolen information, and experience.

The group used various techniques such as phishing, fishing, and call forwarding techniques to create duplicate SIM cards using the SIM Swapping technique.

Once they successfully swapped the SIM card they took control of the electronic banking of their victims and made fraudulent transfers to a network.

The Combined attack allowed them to access the funds in the victims’ accounts, which they had until the existing balance was exhausted.

“The solvency with which the criminal organization acted against the companies was such that they got in touch with their local distributors, posing as the technical service of their platform, to steal the user credentials of the employees.”

Bought Cards from Dark Web

As a result ” This gave them access to the database of the telephone operators themselves and allowed them to obtain the personal data of the victims, making duplicate SIM cards themselves.” Spanish police said in a press release report.

Enforcement officials found that the organization also used members of a second action cell specialized in committing fraud through carding (cloning bank cards) and obtaining personal information through social engineering.

Also, the group bought ID and credit card numbers through various black markets on the Dark Web using cryptocurrencies and successfully cloned cards used to buy purchase luxury products and also get delivered by displaying the physical ID cards stolen or purchased on black markets.

Police have carried out seven home searches in which a hardware-type cryptocurrency portfolio, 45 SIM cards, 11 mobile phones, 4 laptops, a high-end vehicle and abundant documentation related to the facts investigated have been involved.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...