Friday, February 28, 2025
HomeCyber CrimeEuropol Knock Down 100+ Organized Cybercriminals Who Involved SIM Swapping & Other...

Europol Knock Down 100+ Organized Cybercriminals Who Involved SIM Swapping & Other Online Frauds

Published on

SIEM as a Service

Follow Us on Google News

The law enforcement Spanish National Police (Policía Nacional), Italian National Police (Polizia di Stato), Europol, and Eurojust have recently dismantled a cybercriminal network connected to the Italian mafia.

After the news, the police started their operation to find the cybercriminals, the operation led to the arrests of 106 people on the island of Tenerife in Spain, as well as in Turin and Isernia in Italy, who are involved in various cybercrimes and money laundering.

After arresting the cybercriminal, the law enforcement officers have proclaimed that this group of people was mainly involved in cybercrime like SIM-card swapping, as well as phishing and vishing, and they also try to comprehend the networks of companies, steal funds, or trick employees into transferring payments to accounts managed by the threat actors.

Overall Results

On completion of the investigation, the law enforcement has listed the overall results, and here we have mentioned them below:

  • 106 arrests, mostly in Spain and some in Italy 
  • 16 houses were searched 
  • 118 bank accounts halted
  • Seizures involve many electronic devices
  • 224 credit cards
  • SIM cards
  • Point-of-sale terminals
  • A marijuana plantation, and tools for its cultivation and distribution.

Europol to support the field activities

Europol expedited the data that has been exchanged, the operational coordination, and implemented a brief of analytical support for this investigation.

The investigation has lasted over a year, and during the operational activities, Europol extended two investigators and along with that one forensic expert to Tenerife, Spain, and one analyst to Italy. 

Not only this, Europol has also funded the deployment of three Italian researchers to Tenerife so that they can support the Spanish officials during the operation day.

However, the Joint Cybercrime Action Taskforce (J-CAT) at Europol has fully supported the procedure. The whole standing operational team involves cyber liaison officers that belong to different countries and those who work from the same department on high-profile cybercrime inquiries. But, when the threat attackers were recognized and perceived, the group abused the victim and telling them not to testify.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

Russian Government Proposes Stricter Penalties to Tackle Cybercrime

The Russian government has unveiled sweeping legislative reforms aimed at curbing cybercrime, introducing stricter...

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software...