Interpol arrests 3 scammers targeting 500,000 entities

- Advertisement -

Interpol has arrested three Nigerian fraudsters suspected of being members of a organized cybercrime group responsible for distributing malware, carrying out phishing campaigns and e-mail fraud.

The investigation, codenamed Operation Falcon, was conducted jointly between Interpol, the cybersecurity company Group-IB and the Nigerian police force.

To date, some 50,000 victims have been identified and have been targeted through criminal schemes, and the investigation continues to track down other suspected gang members and the group’s income-generating methods.

Group-IB’s participation in the year-long operation was part of interpol’s Project Gateway project, which provides agreements with selected partners and receives direct threat information.

- Advertisement -

Interpol said the suspects had developed fraudulent phishing links, domains and mass mail campaigns in which they impersonated representatives of the organizations.

They used these campaigns to publish 26 malicious programs, including AgentTesla, Loki, Azorult, Spartan, nanocore and Remcos Remote Access Trojans.

In addition to phishing campaigns and e-mails containing malicious attachments, attacks have been used to infiltrate and monitor victims and individual systems.

This has led to the penetration of at least 500,000 state and private companies in more than 150 countries since 2017.

- Advertisement -

According to Group-IB, the three individuals are believed to be members of a cybercrime ring they were tracking under the name TMT.

Mass phishing campaigns via e-mail have benefited from Gammadyne Mailer and Turbo-Mailer to send phishing emails.

The group also relied on MailChimp to see if the recipient had opened the message.

Group-IB noted that the ultimate goal of the attacks was to steal authentication data from browsers and e-mail from companies in the United States, the United Kingdom, Singapore, Japan, Nigeria and others.

- Advertisement -

Craig Jones, Interpol’s director of cybercrime, said the group was running a well-established criminal business model and used many tools and techniques to maximize profits.

Related Stories

Stay on op - Ge the daily news in your inbox

Recent Articles