Tuesday, February 11, 2025
HomeCyber CrimeInterpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks

Interpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks

Published on

SIEM as a Service

Follow Us on Google News

The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge in digital insecurity and cybercriminals threats across Africa. 

This operation spanned 25 African countries and successfully identified 20,674 suspicious cyber networks, leading to the arrest of 14 suspected cyber criminals. 

These networks were linked to financial losses exceeding USD 40 million. This article delves into the operational highlights, key findings, and significance of the Africa Cyber Surge II operation.

Operational Highlights

The four-month Africa Cyber Surge II operation, launched in April 2023, focused on identifying cybercriminals and compromised infrastructure. 

In collaboration with the INTERPOL Africa Cybercrime Operations Desk and AFRIPOL’s Support Programme, INTERPOL’s Cyber Crime Directorate orchestrated the operation. 

Africa Cyber Surge Operation

The primary aim was to streamline cooperation between African law enforcement agencies, fostering communication, analysis, and intelligence sharing to combat cyber threats effectively. 

This operation targeted cyber extortion, phishing, business email compromise, and online scams.

Operational successes were noted across participating countries:

  • Cameroon: Arrested three suspects in connection with an online scam involving fraudulent art sales worth USD 850,000.
  • Nigeria: Apprehended a suspect accused of defrauding a Gambian victim.
  • Mauritius: Arrested two money mules linked to messaging platform-initiated scams.
  • Gambia: Took down 185 malicious Internet Protocols (IPs) through proactive measures and strong partnerships.
  • Kenya: Successfully dismantled 615 malware hosters.

Key Findings and Analysis

The operation produced around 150 analytical reports, providing participating countries with crucial intelligence and insights. 

Developed by INTERPOL in collaboration with partners like Group-IB, Trend Micro, Kaspersky, and Coinbase, these reports highlighted:

  • 3,786 malicious command and control servers
  • 14,134 victim IPs linked to data stealer cases
  • 1,415 phishing links and domains
  • 939 scam IPs
  • Over 400 other malicious URLs, IPs, and botnets.

The significance of these findings underscores the undeniable link between financial crime and cybercrime. 

By adopting a “follow the money” approach, participating countries were able to expand their law enforcement responses. 

This approach enhances the effectiveness of cybercrime departments and solidifies partnerships with vital stakeholders, including computer emergency response teams and Internet Service Providers. 

The Africa Cyber Surge II operation serves as a clarion call for global cooperation to combat cybercrime and its far-reaching impact.

The success of the Africa Cyber Surge II operation was not a singular effort. 

It was preceded by a tabletop exercise in Tanzania, imparting essential skills and knowledge to officials from 20 African countries. 

As technologies like Information Communication Technologies and Artificial Intelligence continue to evolve, it is paramount for public and private entities to collaborate against cyber criminals. 

Coordinated operations like Cyber Surge are essential for disrupting criminal networks and ensuring comprehensive levels of protection.

Funding from the UK Foreign Commonwealth and Development Office, the German Federal Foreign Office, and the Council of Europe played a pivotal role in enabling this operation, further emphasizing the necessity of international support in tackling cyber threats.

The Africa Cyber Surge II operation stands as a testament to the evolving landscape of digital insecurity and cyber threats. 

The operation successfully identified and disrupted cybercriminal networks by fostering international cooperation, sharing intelligence, and adopting innovative strategies. 

This operation highlights the urgency for governments, law enforcement agencies, and private sector partners to collaborate proactively and effectively. 

As the digital realm continues to expand, operations like Africa Cyber Surge II pave the way for a more secure and interconnected future.

Keep informed about the latest Cyber Security News by following us on GoogleNewsLinkedinTwitter, and Facebook.

Latest articles

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks.According...

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical...

Enhanced IllusionCAPTCHA: Advanced Protection Against AI-Powered CAPTCHA Attacks

As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities.Recent studies...

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat

January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks.According...

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical...

Enhanced IllusionCAPTCHA: Advanced Protection Against AI-Powered CAPTCHA Attacks

As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities.Recent studies...