Thursday, April 17, 2025
HomeCyber CrimeSpain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Spain Arrests 34 Cybercriminals Who Stole Data of 4 Million People

Published on

SIEM as a Service

Follow Us on Google News

Law enforcement officials have successfully apprehended a notorious criminal organization responsible for perpetrating computer scams and stealing sensitive data belonging to more than four million individuals.

Law enforcement officials arrested a criminal organization consisting of 34 cybercriminals. During the operation, authorities conducted 16 searches in various towns and seized several items, including two simulated firearms, a katana, a basketball, 80,000 euros in cash, four high-end vehicles, a database containing information on 4 million individuals, a computer, and electronic equipment worth thousands of euros.

Close to €3 million was illegally obtained by the group through various fraudulent means such as smishing, phishing, vishing, the son-in-distress scam, manipulation of technology company delivery notes, and pretending to be employees of an electricity supply company while engaging in vishing campaigns.

- Advertisement - Google News

Spoofing Techniques

Smishing: Smishing is a text message tricking recipients into clicking a link or sending private information to an attacker.

Phishing: Phishing is a social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.

Vishing: Vishing is a phone scam to steal confidential information from individuals or organizations.

Cryptocurrency assets were purchased by the leaders of the network using their profits. They also created fake documentation and used spoofing techniques to conceal their identities.

A specialized agent from the Central Cybercrime Unit conducted an investigation and discovered a criminal network that had unlawfully accessed the databases of several financial and credit institutions.

The network had deposited varying sums of money from the credit institution into their customers’ accounts.

Various banks’ identities were impersonated in vishing campaigns, while electricity supply companies’ identities were used in phishing campaigns, along with the ‘son in distress’ scam. The information was utilized for these purposes.

The organization’s fraudulent scheme consisted of rerouting the products obtained from suppliers towards the organization itself, effectively sidestepping the intended recipient company that had purchased the computer and electronic goods.

The main leaders of the network have been arrested, and over 1,000 complaints have been resolved, with the possibility of identifying more perpetrators and victims.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Latest articles

Managing Burnout in the SOC – What CISOs Can Do

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...