Sunday, June 15, 2025
HomeBitcoinEuropol Busted a 235 Counterfeit Money Dealers on Darkweb & Seized Computers,...

Europol Busted a 235 Counterfeit Money Dealers on Darkweb & Seized Computers, Bitcoins and Hardware

Published on

SIEM as a Service

Follow Us on Google News

An Illegal darknet counterfeit euro banknotes platform busted by law enforcement agencies and arrested 235 suspects who bought illegal counterfeit money from Darkweb market.

Cybercriminals are using Darkweb as a permanent hub to perform various criminal activities including drug dealing, selling stolen data, Malware, ransomware, passports, etc.

This operation was conducted almost 13 different countries and officials seized 1 500 counterfeit euro banknotes. Drugs, weapons (firearms, nunchaku, illegal knives, and blades).

- Advertisement - Google News

Along with this, they seized computers, mobile phones, Bitcoins and hardware for mining virtual currencies.

Europol was lead this operation and the investigation started on 19 November and  3 to 6 December when an investigation went into deep that leads to arrest many of the frauds.

Counterfeit euro Currencies print in Leoben, central Austria and it was identified dismantled the printshop e in June in 2018 with the help of Europol.

The arrested suspect was frequently printing the Counterfeit Money of 10, 20 and 50 euro banknotes and sold them on several illegal Darknet marketplaces.

Police officials searching over 300 in 13 different countries and finally, 235 suspects were detained.

Also the  10000 Counterfeit Money were shipped to many buyers around Europe  who order the notes from darknet marketplace.

According to Europol, the Austrian police found evidence of his transactions and communicated this data to Europol. This information was analysed, enhanced and forwarded to all the affected countries. During an operational meeting at Europol’s headquarters, the Member States decided to organize a coordinated action to achieve the best results possible.

Apart from this Germany performed around 180 house searches, 28 were performed in France, 20 in Italy, 20 in Austria and actions also took place in Croatia, Cyprus, Finland, Ireland, the Netherlands, Portugal, Spain, Switzerland and the United Kingdom, Officials said.

Also Officials warned that, This joint effort highlights that complete anonymity on the internet and the Darknet doesn’t exist. When you engage in illegal activity online, be prepared to have police knocking on your door sooner or later.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Don’t Click “Unsubscribe” links blindly It May Leads to Loss of Credentials

Imagine your inbox is overflowing with promotional emails—some from familiar companies, others less so....

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM

ConnectWise, a leading provider of remote management and cyber protection tools for managed service...

ESET Details on How to Manage Your Digital Footprint

ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital...