Friday, March 29, 2024

Operation reWired – 281 Email Scammers Arrested Worldwide for Attacking Hundreds of Business and Individuals

The FBI and federal authorities announced that they have arrested 281 Email Scammers worldwide in a coordinated effort by law enforcement agencies. The Operation dubbed Operation reWired is a multi-agency effort to dismantle scammers around the globe.

The operation results in 281 arrests, including 167 in Nigeria, 74 in the United States, 18 in Turkey and 15 in Ghana. Authorities also arrested scammers form France, Italy, Japan, Kenya, Malaysia, and the United Kingdom (UK).

According to FBI, the sweep resulted in the seizure of nearly $3.7 million and the disruption and recovery of approximately $118 million in fraudulent wire transfers.

What is BEC?

BEC defined as Business Email Compromise, the scam targets both businesses and individuals who perform legitimate transfer-of-funds requests. The scam mostly targets employees associated with finance departments.

“The Department of Justice has increased efforts in taking aggressive enforcement action against fraudsters who are targeting American citizens and their businesses in business email compromise schemes and other cyber-enabled financial crimes,” said Deputy Attorney General Jeffrey Rosen.

In the last four months, authorities have arrested 74 people in the United States and 207 others have been arrested overseas for alleged financial fraud.

“The consequences of this type of fraud scheme are far-reaching, affecting not only people in the United States but also across the world,” said Chief Postal Inspector Gary Barksdale.

It appears the attackers have stolen “more than 250,000 identities and filed more than 10,000 fraudulent tax returns, attempting to receive more than $91 million in refunds,” said Chief Don Fort of IRS Criminal Investigation.”

Types of BEC Scams

  1. Romance scams
  2. Employment opportunities scams
  3. Fraudulent online vehicle sales scams
  4. Rental scams
  5. Lottery scams

How to stay safe

  1. Have a unique Email address.
  2. Do not open any attachments without proper validation.
  3. Don’t open emails voluntary emails.
  4. Use Spam filters & Antispam gateways.
  5. Never respond to any spam emails.
  6. Use Two-factor authentication
  7. Keep all software updated.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles