Sunday, December 3, 2023

Europol Knock Down 100+ Organized Cybercriminals Who Involved SIM Swapping & Other Online Frauds

The law enforcement Spanish National Police (Policía Nacional), Italian National Police (Polizia di Stato), Europol, and Eurojust have recently dismantled a cybercriminal network connected to the Italian mafia.

After the news, the police started their operation to find the cybercriminals, the operation led to the arrests of 106 people on the island of Tenerife in Spain, as well as in Turin and Isernia in Italy, who are involved in various cybercrimes and money laundering.

After arresting the cybercriminal, the law enforcement officers have proclaimed that this group of people was mainly involved in cybercrime like SIM-card swapping, as well as phishing and vishing, and they also try to comprehend the networks of companies, steal funds, or trick employees into transferring payments to accounts managed by the threat actors.

Overall Results

On completion of the investigation, the law enforcement has listed the overall results, and here we have mentioned them below:

  • 106 arrests, mostly in Spain and some in Italy 
  • 16 houses were searched 
  • 118 bank accounts halted
  • Seizures involve many electronic devices
  • 224 credit cards
  • SIM cards
  • Point-of-sale terminals
  • A marijuana plantation, and tools for its cultivation and distribution.

Europol to support the field activities

Europol expedited the data that has been exchanged, the operational coordination, and implemented a brief of analytical support for this investigation.

The investigation has lasted over a year, and during the operational activities, Europol extended two investigators and along with that one forensic expert to Tenerife, Spain, and one analyst to Italy. 

Not only this, Europol has also funded the deployment of three Italian researchers to Tenerife so that they can support the Spanish officials during the operation day.

However, the Joint Cybercrime Action Taskforce (J-CAT) at Europol has fully supported the procedure. The whole standing operational team involves cyber liaison officers that belong to different countries and those who work from the same department on high-profile cybercrime inquiries. But, when the threat attackers were recognized and perceived, the group abused the victim and telling them not to testify.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles