Thursday, February 27, 2025
HomeCyber CrimeSpain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Published on

SIEM as a Service

Follow Us on Google News

Law enforcement officials have successfully apprehended a notorious criminal organization responsible for perpetrating computer scams and stealing sensitive data belonging to more than four million individuals.

Law enforcement officials arrested a criminal organization consisting of 34 cybercriminals. During the operation, authorities conducted 16 searches in various towns and seized several items, including two simulated firearms, a katana, a basketball, 80,000 euros in cash, four high-end vehicles, a database containing information on 4 million individuals, a computer, and electronic equipment worth thousands of euros.

Close to €3 million was illegally obtained by the group through various fraudulent means such as smishing, phishing, vishing, the son-in-distress scam, manipulation of technology company delivery notes, and pretending to be employees of an electricity supply company while engaging in vishing campaigns.

Spoofing Techniques

Smishing: Smishing is a text message tricking recipients into clicking a link or sending private information to an attacker.

Phishing: Phishing is a social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.

Vishing: Vishing is a phone scam to steal confidential information from individuals or organizations.

Cryptocurrency assets were purchased by the leaders of the network using their profits. They also created fake documentation and used spoofing techniques to conceal their identities.

A specialized agent from the Central Cybercrime Unit conducted an investigation and discovered a criminal network that had unlawfully accessed the databases of several financial and credit institutions.

The network had deposited varying sums of money from the credit institution into their customers’ accounts.

Various banks’ identities were impersonated in vishing campaigns, while electricity supply companies’ identities were used in phishing campaigns, along with the ‘son in distress’ scam. The information was utilized for these purposes.

The organization’s fraudulent scheme consisted of rerouting the products obtained from suppliers towards the organization itself, effectively sidestepping the intended recipient company that had purchased the computer and electronic goods.

The main leaders of the network have been arrested, and over 1,000 complaints have been resolved, with the possibility of identifying more perpetrators and victims.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...