Sunday, April 13, 2025
HomeCyber CrimeEuropol Knock Down 100+ Organized Cybercriminals Who Involved SIM Swapping & Other...

Europol Knock Down 100+ Organized Cybercriminals Who Involved SIM Swapping & Other Online Frauds

Published on

SIEM as a Service

Follow Us on Google News

The law enforcement Spanish National Police (Policía Nacional), Italian National Police (Polizia di Stato), Europol, and Eurojust have recently dismantled a cybercriminal network connected to the Italian mafia.

After the news, the police started their operation to find the cybercriminals, the operation led to the arrests of 106 people on the island of Tenerife in Spain, as well as in Turin and Isernia in Italy, who are involved in various cybercrimes and money laundering.

After arresting the cybercriminal, the law enforcement officers have proclaimed that this group of people was mainly involved in cybercrime like SIM-card swapping, as well as phishing and vishing, and they also try to comprehend the networks of companies, steal funds, or trick employees into transferring payments to accounts managed by the threat actors.

- Advertisement - Google News

Overall Results

On completion of the investigation, the law enforcement has listed the overall results, and here we have mentioned them below:

  • 106 arrests, mostly in Spain and some in Italy 
  • 16 houses were searched 
  • 118 bank accounts halted
  • Seizures involve many electronic devices
  • 224 credit cards
  • SIM cards
  • Point-of-sale terminals
  • A marijuana plantation, and tools for its cultivation and distribution.

Europol to support the field activities

Europol expedited the data that has been exchanged, the operational coordination, and implemented a brief of analytical support for this investigation.

The investigation has lasted over a year, and during the operational activities, Europol extended two investigators and along with that one forensic expert to Tenerife, Spain, and one analyst to Italy. 

Not only this, Europol has also funded the deployment of three Italian researchers to Tenerife so that they can support the Spanish officials during the operation day.

However, the Joint Cybercrime Action Taskforce (J-CAT) at Europol has fully supported the procedure. The whole standing operational team involves cyber liaison officers that belong to different countries and those who work from the same department on high-profile cybercrime inquiries. But, when the threat attackers were recognized and perceived, the group abused the victim and telling them not to testify.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Two Cybercriminals Arrested for ATM Jackpotting Scheme

Federal authorities have unveiled details of a sophisticated cybercrime operation targeting financial institutions across...