Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

September 20, 2024 at 09:51AM

Law enforcement authorities conducted Operation Kaerb, dismantling an international criminal network leveraging the iServer phishing platform. This led to 17 arrests, 28 searches, and seizure of items, with an estimated 1.2 million mobile phones unlocked. Additionally, Ghost, an encrypted communications network, was dismantled, and 47 cryptocurrency exchanges in Germany were seized for illicit activities. Two individuals were charged by the U.S. DoJ for a $230 million cryptocurrency scam.

From the provided meeting notes, the following key takeaways have been identified:

1. Europol and law enforcement agencies from several countries successfully conducted a joint operation, dubbed Operation Kaerb, to take down an international criminal network that operated a phishing platform called iServer. The platform targeted mainly Spanish-speaking nationals from European, North American, and South American countries and was used to unlock stolen or lost mobile phones. The operation led to 17 arrests, 28 searches, and the seizure of 921 items, including mobile phones, electronic devices, vehicles, and weapons.

2. The iServer platform, according to Group-IB, was unique in its focus on harvesting credentials to unlock stolen phones through phishing. It enabled low-skilled criminals known as “unlockers” to siphon device passwords and user credentials from cloud-based mobile platforms, allowing them to bypass Lost Mode and unlock devices.

3. Additionally, the meeting notes mentioned the dismantling of an encrypted communications network called Ghost, which facilitated serious and organized crime across the world. The platform was used for illegal activities such as trafficking, money laundering, and acts of extreme violence. Europol and the Australian Federal Police revealed that 51 suspects had been arrested, with one individual from Sydney, New South Wales being charged with creating and administering Ghost.

4. Another coordinated law enforcement action led to the takedown of 47 cryptocurrency exchange services in Germany that enabled illegal money laundering activities for cybercriminals, including ransomware groups, darknet dealers, and botnet operators. The operation, codenamed Final Exchange, targeted services accused of failing to implement Know Your Customer (KYC) or anti-money laundering programs.

5. Finally, the U.S. Department of Justice (DoJ) charged two suspects with conspiracy to steal and launder over $230 million in cryptocurrency from an unnamed victim in Washington D.C. The suspects are alleged to have carried out cryptocurrency thefts and used the proceeds to fund an extravagant lifestyle, including international travel, nightclubs, luxury automobiles, watches, jewelry, designer handbags, and rental homes in Los Angeles and Miami.

These key takeaways provide a comprehensive overview of the significant law enforcement actions and their outcomes in combating international cybercrime and illegal activities related to phishing, encrypted communications networks, and cryptocurrency exchanges.

Full Article