Monday, March 24, 2025
HomeCyber Crime'Black Panthers' - A SIM Swap Gang Connected With Dark Web Got...

‘Black Panthers’ – A SIM Swap Gang Connected With Dark Web Got Arrested

Published on

SIEM as a Service

Follow Us on Google News

Spanish National Police arrested the notorious SIM-swapping gang operating under the name “Black Panthers” for various cyber crimes.

The law enforcement agents arrested 55 people, including the leader heading this Black Panthers gang.

The operators behind this Black Panthers committed the bank scams through SIM swapping attacks with other methods such as social engineering techniques, VishingPhishing, or Carding to call forwarding.

There 100s of victims got scammed and this group stole around 250,000 euros.

“The investigation -which has made it possible to detect some 100 victims and a fraud amounting to 250,000 euros distributed throughout the national territory- has ended with the arrest of 55 people of different nationalities.”

Criminals Network Structure

The criminal gang formed a well structure network and each division employed the respective skill, accessibility to stolen information, and experience.

The group used various techniques such as phishing, fishing, and call forwarding techniques to create duplicate SIM cards using the SIM Swapping technique.

Once they successfully swapped the SIM card they took control of the electronic banking of their victims and made fraudulent transfers to a network.

The Combined attack allowed them to access the funds in the victims’ accounts, which they had until the existing balance was exhausted.

“The solvency with which the criminal organization acted against the companies was such that they got in touch with their local distributors, posing as the technical service of their platform, to steal the user credentials of the employees.”

Bought Cards from Dark Web

As a result ” This gave them access to the database of the telephone operators themselves and allowed them to obtain the personal data of the victims, making duplicate SIM cards themselves.” Spanish police said in a press release report.

Enforcement officials found that the organization also used members of a second action cell specialized in committing fraud through carding (cloning bank cards) and obtaining personal information through social engineering.

Also, the group bought ID and credit card numbers through various black markets on the Dark Web using cryptocurrencies and successfully cloned cards used to buy purchase luxury products and also get delivered by displaying the physical ID cards stolen or purchased on black markets.

Police have carried out seven home searches in which a hardware-type cryptocurrency portfolio, 45 SIM cards, 11 mobile phones, 4 laptops, a high-end vehicle and abundant documentation related to the facts investigated have been involved.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which...

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which...

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed "Weaver Ant," has...

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously...