Monday, March 4, 2024

Europol Knock Down 100+ Organized Cybercriminals Who Involved SIM Swapping & Other Online Frauds

The law enforcement Spanish National Police (Policía Nacional), Italian National Police (Polizia di Stato), Europol, and Eurojust have recently dismantled a cybercriminal network connected to the Italian mafia.

After the news, the police started their operation to find the cybercriminals, the operation led to the arrests of 106 people on the island of Tenerife in Spain, as well as in Turin and Isernia in Italy, who are involved in various cybercrimes and money laundering.

After arresting the cybercriminal, the law enforcement officers have proclaimed that this group of people was mainly involved in cybercrime like SIM-card swapping, as well as phishing and vishing, and they also try to comprehend the networks of companies, steal funds, or trick employees into transferring payments to accounts managed by the threat actors.

Overall Results

On completion of the investigation, the law enforcement has listed the overall results, and here we have mentioned them below:

  • 106 arrests, mostly in Spain and some in Italy 
  • 16 houses were searched 
  • 118 bank accounts halted
  • Seizures involve many electronic devices
  • 224 credit cards
  • SIM cards
  • Point-of-sale terminals
  • A marijuana plantation, and tools for its cultivation and distribution.

Europol to support the field activities

Europol expedited the data that has been exchanged, the operational coordination, and implemented a brief of analytical support for this investigation.

The investigation has lasted over a year, and during the operational activities, Europol extended two investigators and along with that one forensic expert to Tenerife, Spain, and one analyst to Italy. 

Not only this, Europol has also funded the deployment of three Italian researchers to Tenerife so that they can support the Spanish officials during the operation day.

However, the Joint Cybercrime Action Taskforce (J-CAT) at Europol has fully supported the procedure. The whole standing operational team involves cyber liaison officers that belong to different countries and those who work from the same department on high-profile cybercrime inquiries. But, when the threat attackers were recognized and perceived, the group abused the victim and telling them not to testify.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates


Latest articles

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles