Tuesday, February 27, 2024

INTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber Attacks

A recent massive operation by INTERPOL, which happens to be the biggest international police organization in the world, has successfully targeted the underlying infrastructure behind malicious activities such as phishing, malware, and ransomware attacks.

The operation is a significant step towards mitigating the impact of these nefarious activities and ensuring a safer online environment for everyone.

During the three-month period from September to November 2023, a global operation called “Synergia” was conducted across more than 50 countries, involving a total of 60 law enforcement agencies.

This operation was aimed at tackling complex and cross-border criminal activities, with a focus on employing advanced technical tools and methodologies for effective investigations and interventions.

Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

  • 1,300 suspicious websites and servers linked to cybercrime were identified.
  • 70% of these malicious servers were taken down, disrupting their operations.
  • 31 individuals were arrested, with 70 more suspects identified.
  • Countries across continents participated, from Europe and Asia to Africa and South America.

Operation “Synergia”’ involved:

  • Conducting house searches and seizures of equipment
  • Collaboration with private sector partners: Tech giants like Kaspersky and TrendMicro provided crucial intelligence and support.

Assistant Director “Bernardo Pillot” at INTERPOL Cyber Crime added:

“The results of this operation, achieved through the collective efforts of multiple countries and partners, show our unwavering commitment to safeguarding the digital space. By dismantling the infrastructure behind phishing, banking malware, and ransomware attacks, we are one step closer to protecting our digital ecosystems and a safer, more secure online experience for all”.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


Latest articles

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access...

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like "remittance" and "receipts" to spread phishing scripts using...

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security...

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress,...

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024,...

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to...

Anonymous Sudan Promoting New DDoS Botnet: Beware

It has come to light that a group known as Anonymous Sudan is actively...
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles