Sunday, May 4, 2025
HomeBitcoinEuropol Busted a 235 Counterfeit Money Dealers on Darkweb & Seized Computers,...

Europol Busted a 235 Counterfeit Money Dealers on Darkweb & Seized Computers, Bitcoins and Hardware

Published on

SIEM as a Service

Follow Us on Google News

An Illegal darknet counterfeit euro banknotes platform busted by law enforcement agencies and arrested 235 suspects who bought illegal counterfeit money from Darkweb market.

Cybercriminals are using Darkweb as a permanent hub to perform various criminal activities including drug dealing, selling stolen data, Malware, ransomware, passports, etc.

This operation was conducted almost 13 different countries and officials seized 1 500 counterfeit euro banknotes. Drugs, weapons (firearms, nunchaku, illegal knives, and blades).

- Advertisement - Google News

Along with this, they seized computers, mobile phones, Bitcoins and hardware for mining virtual currencies.

Europol was lead this operation and the investigation started on 19 November and  3 to 6 December when an investigation went into deep that leads to arrest many of the frauds.

Counterfeit euro Currencies print in Leoben, central Austria and it was identified dismantled the printshop e in June in 2018 with the help of Europol.

The arrested suspect was frequently printing the Counterfeit Money of 10, 20 and 50 euro banknotes and sold them on several illegal Darknet marketplaces.

Police officials searching over 300 in 13 different countries and finally, 235 suspects were detained.

Also the  10000 Counterfeit Money were shipped to many buyers around Europe  who order the notes from darknet marketplace.

According to Europol, the Austrian police found evidence of his transactions and communicated this data to Europol. This information was analysed, enhanced and forwarded to all the affected countries. During an operational meeting at Europol’s headquarters, the Member States decided to organize a coordinated action to achieve the best results possible.

Apart from this Germany performed around 180 house searches, 28 were performed in France, 20 in Italy, 20 in Austria and actions also took place in Croatia, Cyprus, Finland, Ireland, the Netherlands, Portugal, Spain, Switzerland and the United Kingdom, Officials said.

Also Officials warned that, This joint effort highlights that complete anonymity on the internet and the Darknet doesn’t exist. When you engage in illegal activity online, be prepared to have police knocking on your door sooner or later.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Target Critical National Infrastructure with New Malware and Tools

A recent investigation by the FortiGuard Incident Response (FGIR) team has uncovered a sophisticated,...

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

StealC, a notorious information stealer and malware downloader first sold in January 2023, has...

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by...

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

The Double-Edged Sword of AI in Cybersecurity: Threats, Defenses & the Dark Web Insights Report 2025

Check Point Research's latest AI Security Report 2025 reveals a rapidly evolving cybersecurity landscape...

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...