Tuesday, December 3, 2024
Homecyber securityThousands of Individuals Were Rescued from Cybercrime Groups

Thousands of Individuals Were Rescued from Cybercrime Groups

Published on

SIEM as a Service

Around 2700 people were rescued in Manila who were involved in Human Trafficking for fraudulent online gaming sites and other cybercrime groups.

The latest news regarding nighttime rides shows Las Pinas City in metropolitan Manila has become the Hubspot for cybercrime syndicates.

After investigation, police found that these suspects had fallen into the trap and were not allowed to quit the job easily once they realized.

- Advertisement - SIEM as a Service

Unemployment, the need for money, and less user awareness make people fall into the trap of scams on the internet with fancy advertisements and excellent pay.

Cybercrime scams have become a significant issue in Asia, with reports of people from outside the region being enticed to take jobs in countries such as Myanmar and Cambodia, which are plagued by civil strife. 

Nevertheless, many of these workers are compelled to participate in internet-based scams and virtual servitude.

In May, leaders from the Association of Southeast Asian Nations agreed at a summit in Indonesia to tighten border controls and law enforcement and broaden public education to fight criminal syndicates that traffic workers to other nations, where they are made to participate in online fraud.

The team of police heads with Brig. Gen. Sydney Hernia said police armed with warrants raided and searched the buildings around midnight in Las Pinas and rescued 1,534 Filipinos and 1,190 foreigners from at least 17 countries, including 604 Chinese, 183 Vietnamese, 137 Indonesians, 134 Malaysians, and 81 Thais. 

There were also a few people from Myanmar, Pakistan, Yemen, Somalia, Sudan, Nigeria, and Taiwan.

In May, police raided another suspected cybercrime base at the Clark freeport in Mabalacat City, Pampanga province, north of Manila, seizing nearly 1,400 Filipino and foreign employees who were allegedly coerced into conducting cryptocurrency scams.

During investigations, the suspects confessed that they were not allowed to resign for unclear reasons. According to the AP news report, they were threatened to pay a hefty amount when attempting to leave.

“AI-based email security measures Protect your business From Email Threats!” – .

Latest articles

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of...

ElizaRAT Exploits Google, Telegram, & Slack Services For C2 Communications

APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a...

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of...