Interpol Arrested 14 cybercriminals and uncovered 20,674 suspicious cyber networks

The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge in digital insecurity and cybercriminals threats across Africa. 

This operation spanned 25 African countries and successfully identified 20,674 suspicious cyber networks, leading to the arrest of 14 suspected cyber criminals. 

These networks were linked to financial losses exceeding USD 40 million. This article delves into the operational highlights, key findings, and significance of the Africa Cyber Surge II operation.

Operational Highlights

The four-month Africa Cyber Surge II operation, launched in April 2023, focused on identifying cybercriminals and compromised infrastructure. 

In collaboration with the INTERPOL Africa Cybercrime Operations Desk and AFRIPOL’s Support Programme, INTERPOL’s Cyber Crime Directorate orchestrated the operation. 

Africa Cyber Surge Operation

The primary aim was to streamline cooperation between African law enforcement agencies, fostering communication, analysis, and intelligence sharing to combat cyber threats effectively. 

This operation targeted cyber extortion, phishing, business email compromise, and online scams.

Operational successes were noted across participating countries:

  • Cameroon: Arrested three suspects in connection with an online scam involving fraudulent art sales worth USD 850,000.
  • Nigeria: Apprehended a suspect accused of defrauding a Gambian victim.
  • Mauritius: Arrested two money mules linked to messaging platform-initiated scams.
  • Gambia: Took down 185 malicious Internet Protocols (IPs) through proactive measures and strong partnerships.
  • Kenya: Successfully dismantled 615 malware hosters.

Key Findings and Analysis

The operation produced around 150 analytical reports, providing participating countries with crucial intelligence and insights. 

Developed by INTERPOL in collaboration with partners like Group-IB, Trend Micro, Kaspersky, and Coinbase, these reports highlighted:

  • 3,786 malicious command and control servers
  • 14,134 victim IPs linked to data stealer cases
  • 1,415 phishing links and domains
  • 939 scam IPs
  • Over 400 other malicious URLs, IPs, and botnets.

The significance of these findings underscores the undeniable link between financial crime and cybercrime. 

By adopting a “follow the money” approach, participating countries were able to expand their law enforcement responses. 

This approach enhances the effectiveness of cybercrime departments and solidifies partnerships with vital stakeholders, including computer emergency response teams and Internet Service Providers. 

The Africa Cyber Surge II operation serves as a clarion call for global cooperation to combat cybercrime and its far-reaching impact.

The success of the Africa Cyber Surge II operation was not a singular effort. 

It was preceded by a tabletop exercise in Tanzania, imparting essential skills and knowledge to officials from 20 African countries. 

As technologies like Information Communication Technologies and Artificial Intelligence continue to evolve, it is paramount for public and private entities to collaborate against cyber criminals. 

Coordinated operations like Cyber Surge are essential for disrupting criminal networks and ensuring comprehensive levels of protection.

Funding from the UK Foreign Commonwealth and Development Office, the German Federal Foreign Office, and the Council of Europe played a pivotal role in enabling this operation, further emphasizing the necessity of international support in tackling cyber threats.

The Africa Cyber Surge II operation stands as a testament to the evolving landscape of digital insecurity and cyber threats. 

The operation successfully identified and disrupted cybercriminal networks by fostering international cooperation, sharing intelligence, and adopting innovative strategies. 

This operation highlights the urgency for governments, law enforcement agencies, and private sector partners to collaborate proactively and effectively. 

As the digital realm continues to expand, operations like Africa Cyber Surge II pave the way for a more secure and interconnected future.

Keep informed about the latest Cyber Security News by following us on GoogleNewsLinkedinTwitter, and Facebook.

Sujatha

Recent Posts

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing Apple’s…

49 minutes ago

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network –…

2 hours ago

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…

3 hours ago

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…

6 hours ago

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…

6 hours ago

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…

8 hours ago