Saturday, September 7, 2024
HomeCyber AttackINTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber Attacks

INTERPOL Uncovers 1,300+ Servers Used as Launchpads For Cyber Attacks

Published on

A recent massive operation by INTERPOL, which happens to be the biggest international police organization in the world, has successfully targeted the underlying infrastructure behind malicious activities such as phishing, malware, and ransomware attacks.

The operation is a significant step towards mitigating the impact of these nefarious activities and ensuring a safer online environment for everyone.

During the three-month period from September to November 2023, a global operation called “Synergia” was conducted across more than 50 countries, involving a total of 60 law enforcement agencies.

- Advertisement - EHA

This operation was aimed at tackling complex and cross-border criminal activities, with a focus on employing advanced technical tools and methodologies for effective investigations and interventions.

Document
Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

  • 1,300 suspicious websites and servers linked to cybercrime were identified.
  • 70% of these malicious servers were taken down, disrupting their operations.
  • 31 individuals were arrested, with 70 more suspects identified.
  • Countries across continents participated, from Europe and Asia to Africa and South America.

Operation “Synergia”’ involved:

  • Conducting house searches and seizures of equipment
  • Collaboration with private sector partners: Tech giants like Kaspersky and TrendMicro provided crucial intelligence and support.

Assistant Director “Bernardo Pillot” at INTERPOL Cyber Crime added:

“The results of this operation, achieved through the collective efforts of multiple countries and partners, show our unwavering commitment to safeguarding the digital space. By dismantling the infrastructure behind phishing, banking malware, and ransomware attacks, we are one step closer to protecting our digital ecosystems and a safer, more secure online experience for all”.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...