Monday, October 14, 2024
HomeCyber CrimeInterpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks

Interpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks

Published on

Malware protection

The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge in digital insecurity and cybercriminals threats across Africa. 

This operation spanned 25 African countries and successfully identified 20,674 suspicious cyber networks, leading to the arrest of 14 suspected cyber criminals. 

These networks were linked to financial losses exceeding USD 40 million. This article delves into the operational highlights, key findings, and significance of the Africa Cyber Surge II operation.

- Advertisement - SIEM as a Service

Operational Highlights

The four-month Africa Cyber Surge II operation, launched in April 2023, focused on identifying cybercriminals and compromised infrastructure. 

In collaboration with the INTERPOL Africa Cybercrime Operations Desk and AFRIPOL’s Support Programme, INTERPOL’s Cyber Crime Directorate orchestrated the operation. 

Africa Cyber Surge Operation

The primary aim was to streamline cooperation between African law enforcement agencies, fostering communication, analysis, and intelligence sharing to combat cyber threats effectively. 

This operation targeted cyber extortion, phishing, business email compromise, and online scams.

Operational successes were noted across participating countries:

  • Cameroon: Arrested three suspects in connection with an online scam involving fraudulent art sales worth USD 850,000.
  • Nigeria: Apprehended a suspect accused of defrauding a Gambian victim.
  • Mauritius: Arrested two money mules linked to messaging platform-initiated scams.
  • Gambia: Took down 185 malicious Internet Protocols (IPs) through proactive measures and strong partnerships.
  • Kenya: Successfully dismantled 615 malware hosters.

Key Findings and Analysis

The operation produced around 150 analytical reports, providing participating countries with crucial intelligence and insights. 

Developed by INTERPOL in collaboration with partners like Group-IB, Trend Micro, Kaspersky, and Coinbase, these reports highlighted:

  • 3,786 malicious command and control servers
  • 14,134 victim IPs linked to data stealer cases
  • 1,415 phishing links and domains
  • 939 scam IPs
  • Over 400 other malicious URLs, IPs, and botnets.

The significance of these findings underscores the undeniable link between financial crime and cybercrime. 

By adopting a “follow the money” approach, participating countries were able to expand their law enforcement responses. 

This approach enhances the effectiveness of cybercrime departments and solidifies partnerships with vital stakeholders, including computer emergency response teams and Internet Service Providers. 

The Africa Cyber Surge II operation serves as a clarion call for global cooperation to combat cybercrime and its far-reaching impact.

The success of the Africa Cyber Surge II operation was not a singular effort. 

It was preceded by a tabletop exercise in Tanzania, imparting essential skills and knowledge to officials from 20 African countries. 

As technologies like Information Communication Technologies and Artificial Intelligence continue to evolve, it is paramount for public and private entities to collaborate against cyber criminals. 

Coordinated operations like Cyber Surge are essential for disrupting criminal networks and ensuring comprehensive levels of protection.

Funding from the UK Foreign Commonwealth and Development Office, the German Federal Foreign Office, and the Council of Europe played a pivotal role in enabling this operation, further emphasizing the necessity of international support in tackling cyber threats.

The Africa Cyber Surge II operation stands as a testament to the evolving landscape of digital insecurity and cyber threats. 

The operation successfully identified and disrupted cybercriminal networks by fostering international cooperation, sharing intelligence, and adopting innovative strategies. 

This operation highlights the urgency for governments, law enforcement agencies, and private sector partners to collaborate proactively and effectively. 

As the digital realm continues to expand, operations like Africa Cyber Surge II pave the way for a more secure and interconnected future.

Keep informed about the latest Cyber Security News by following us on GoogleNewsLinkedinTwitter, and Facebook.

Latest articles

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...