Operation Synergia II aimed to tackle a range of cybercrimes, including phishing, malware distribution, and ransomware attacks. Cybercriminals exploit vulnerabilities to steal sensitive information, disrupt services, and extort money. The operation's success lies in its collaborative approach, involving INTERPOL, private cybersecurity firms like Kasperksy, and national law enforcement agencies. This partnership was crucial in sharing intelligence, resources, and expertise, enabling swift and effective actions against cyber threats.
In Hong Kong, authorities dismantled over 1,000 servers linked to cybercrimes, while investigators in Mongolia confiscated equipment and identified 93 suspects. Macau and Madagascar also played vital roles by deactivating hundreds of servers and seizing electronic devices.
Neal Jetton, Director of Interpol's Cybercrime Directorate, remarked, “The global nature of cybercrime requires a global response… Together, we’ve dismantled malicious infrastructure and protected countless potential victims.”
The operation led to the seizure of over 22,000 malicious IP addresses and servers. This massive takedown disrupted numerous criminal networks, preventing further attacks and mitigating potential damages. The seized assets included servers used for hosting phishing websites, distributing malware, and coordinating ransomware operations.
Phishing Schemes: Phishing remains one of the most prevalent and dangerous forms of cybercrime. Cybercriminals use deceptive emails and websites to trick individuals into revealing personal information, such as passwords and credit card details. By targeting and taking down phishing servers, Operation Synergia II significantly reduced the risk of individuals falling victim to these scams.
Malware Distribution: Malware, or malicious software, can cause extensive damage to individuals and organizations. It can steal sensitive information, disrupt operations, and even take control of infected systems. The operation's success in dismantling malware distribution networks has helped curb the spread of harmful software and protect countless users.
Ransomware Attacks: Ransomware is a type of malware that encrypts a victim's files, demanding payment for their release. It has become a major threat to businesses, governments, and individuals worldwide. By targeting the infrastructure used to deploy ransomware, Operation Synergia II has disrupted these extortion schemes and safeguarded potential victims.
Could the future of law enforcement lie in the virtual world? In a pioneering move, INTERPOL established the INTERPOL Metaverse Expert Group in October 2023, aiming to enhance security in the emerging digital world known as the Metaverse. This virtual space, described as a 3D online environment where users interact through avatars, has raised concerns about potential crimes like grooming, radicalization, and cyber-attacks on critical infrastructure.
The INTERPOL Metaverse Expert Group is a collaboration involving INTERPOL member countries, governments, the private sector, academia, and international organizations. Their goal is to make the Metaverse secure by design. While the Metaverse holds promise for transforming various aspects of our lives, it faces challenges such as inadequate infrastructure, privacy concerns, jurisdictional ambiguity, and cybersecurity threats.
One key recommendation from INTERPOL is the integration of artificial intelligence (AI) for predictive policing. However, there are concerns about the legal and ethical implications of relying too heavily on AI. Potential privacy violations and biases, particularly towards marginalized groups, raise red flags. The call for caution emphasises the need for checks and safeguards when using AI-based predictive policing.
Another legal dilemma in the Metaverse revolves around avatars – the digital representations of users. Questions arise about who controls AI-based avatars and their legal status. A recent case in South Korea, where a man was jailed for generating illicit content using AI, highlights the complexity of addressing legal issues tied to avatars.
The report also addresses the challenge of interoperability, emphasising the need for universal protocols to enable seamless interactions across different virtual spaces. Professor Subhajit Basu from the University of Leeds stresses the importance of collaboration between tech companies, governments, and international organizations to establish these protocols while respecting legal jurisdictions.
Basu points out that a significant aspect of the legal framework involves data protection and privacy. As users move their data within the Metaverse, comprehensive legal measures aligned with regulations like Europe's GDPR become crucial.
The INTERPOL report underscores the Metaverse's potential for immersive law enforcement training. However, it highlights complex governance issues and international laws. To bridge these gaps, the report suggests regular policy reviews to adapt to the evolving landscape of the Metaverse.
Recognizing the multi-jurisdictional nature of the Metaverse, the report emphasizes the need for a holistic approach involving collaboration between various stakeholders for an effective response to metacrime. This approach ensures engagement across borders and organizations, essential for navigating the intricate challenges posed by the Metaverse.
INTERPOL’s efforts to address Metaverse-related crimes mark a significant step towards ensuring a secure and responsible digital future. As the Metaverse continues to evolve, the call for collaboration and proactive policies becomes crucial for effective law enforcement and protection of users' rights and privacy.
The agency has also seized assets worth $300 million, across 34 countries. The operation, labelled as Haechi IV, furthermore suspended over 80,000 suspicious bank accounts and cautioned governments of the onset of new types of NFT and AI scams.
Stephen Kavanagh, Interpol’s Executive Director of Police Services informs that “The seizure of USD 300 million represents a staggering sum and clearly illustrates the incentive behind today’s explosive growth of transnational organized crime[…]This vast accumulation of unlawful wealth is a serious threat to global security and weakens the economic stability of nations worldwide.”
This year, Interpol witnessed a massive 200% surge in arrests regarding incidents that involved malicious hacks.
For instance, Comcast suffered a data breach that affected around 56 million accounts, potentially resulting in the compromise of all Xfinity accounts. On Tuesday, ransomware group Rhysida leaked the upcoming Marvel video game from PlayStation, along with the passport information of the game’s developers. Also, last month, 23andMe suffered a loss of biodata of 6.9 million customers in a hack.
In this recent Interpol operation, e-commerce, corporate email compromise, and investment fraud accounted for the majority of the arrests. Haechi IV, however, informed participating nations about two cutting-edge strategies employed by cybercriminals. Interpol discovered that investment fraud, online sexual extortion, and impersonation scams all over the UK were using AI-generated content on multiple occasions. The technology of voice cloning was frequently employed to mimic someone who the victims knew.
Another cyber scam tactic noticed by Interpol that was used in the NFT attacks was very commonly adopted by cybercriminals in South Korea, where victims are promised substantial returns on their investments. However, following the initial investment, these spoof cryptocurrency ventures are frequently dropped. These two con games make use of modern technology and people's shallow knowledge of the subject. "Persistent challenge of cyber-enabled crime, reminding us to stay alert and keep refining our tactics against online fraud," according to Kavanagh, is demonstrated by the 200% increase in arrests.
The police operation, with combined efforts of Interpol, African law enforcement and private-sector security firms, commenced in April and lasted for four months. It was conducted in order to exterminate cyber malpractices like phishing, business email compromise (BEC) and other online scams.
The international agency informed that the operation was conducted with the help and on-the-ground operational support of several infosec companies like Group-IB, Interpol and Uppsala Security. Their efforts helped in making three arrests in Cameroon related to an online scam involving the fake sale of artwork valued at $850,000.
Group-IB, that previously collaborated with Interpol on operations, gathered and communicated more than 1,000 indicators from its threat intelligence.
"Collaboration and intelligence sharing should be at the heart of cybersecurity operations, and Group-IB stands ready to make a further contribution to this end, in line with our core strategic mission of fighting against cybercrime in all its forms," Group-IB CEO Dmitry Volkov stated on Friday.
Information gathered by Group-IB and other private partners like Trend Micro, Kaspersky, and Coinbase aided in formulating some 150 Interpol analytical reports with data containing ‘intel on cyber threats’ from different countries.
Details in the report included:
The first phase of the operation was carried out between July 2022 and November 2022 and resulted in a number of investigations followed by operations against threat actors in the region.
The most recent arrests come after months of similar cybercrime activities across Africa as international law enforcement works to dismantle cybercrime networks that operate out of various African nations.
Over 100 people were detained last week, according to Interpol, throughout the EU and Africa. Cops also recovered assets worth more than € 2.15 million ($2.4 million) that belonged to the Black Axe organized crime and cybercrime group.
In July 2023, cops in Côte d'Ivoire confirmed to have arrested a suspect, who was apparently a ‘key figure’ of cybercrime group – OPER1ER – responsible for defrauding banks and financial firms across 15 countries.
Interpol in a statement reported that the cybercrime group has defrauded the firms of a sum between $11 million to $30 million, with their targets spreading across Africa, Asia and Latin America.
Operation Jackal, conducted between May 15 and 29, apparently mobilized police forces, financial crime units and cybercrime agencies across 21 countries in order to launch a targeted strike on Black Axe and related West African organized criminal gangs.
As of now, more than 200 illicit bank accounts that were linked to online financial crime have been blocked, with several associated suspects arrested whose networks in cybercrime pose a severe threat to international security.
“Organized crime is mostly driven by financial gain and INTERPOL is committed to working with our member countries to deprive these groups of their ill-gotten assets. This successful operation involving so many countries clearly shows what can be achieved through international cooperation, and will serve as a blueprint for concerted police action against financial crime in the future,” says Isaac Kehinde Oginni, Director of INTERPOL’s Financial Crime and Anti-Corruption Centre (IFCACC). “It also sends a strong message to West African crime networks that no matter where they hide in cyberspace, INTERPOL will pursue them relentlessly. The illegal activities of Black Axe and similar crimes syndicates will remain a priority for INTERPOL.”
In Portugal alone, four such investigations led to the accumulated seizure and recovery of around 1.4 EUR million.
A total of 34 suspects have been arrested in the Irish phase of the operation. Amongst these arrests, 12 were detained for investigative purposes and 22 on suspicion of money laundering and gangland-style offences.
According to Deputy Head of the National Central Bureau of Dublin, Tony Kelly, ‘It became apparent early in the investigation that international cooperation and the use of INTERPOL’s analytical and coordination capabilities was essential to the investigation, and remains a pivotal element to the success to date and the ongoing investigation into this group.”
More such investigations have been witnessed across the world as intelligence agencies are putting efforts into investigating the issue.
Black Axe and other West African organized cybercrime syndicates are popular malicious gangs known for cyber-enabled criminal offences like financial fraud, mostly done by compromising company’s email systems, romance scams, inheritance scams, credit card fraud, tax fraud, advance payment scams and money laundering.
The four members, including the kingpin, were detained for allegedly conning the US nationals of 20 million dollars.
According to a statement provided by a Delhi Police official, the information regarding the cybercrimes was received by their Intelligence Fusion & Strategic Operations (IFSO) unit – which deals with complex cybercrime cases – from the FBI and Interpol. The agencies indicated that “some international cybercriminals, in conspiracy with each other and with the aid and assistance of co-conspirators based in India, the US and Uganda, were running call centers by posing as employees of the US Internal Revenue Service, Social Security Administration, Drug Enforcement Administration, and other US agencies,” said H.G.S. Dhaliwal, Special Commissioner Police (Delhi Police Special Cell).
“We received information that one accused, Parth Armarkar, impersonated a specific living person by the name of Uttam Dhillon. During his career, the real Uttam Dhillon served as the Acting Administrator of the US Drug Enforcement Administration and as the Director of INTERPOL Washington. Armarkar defrauded victims of millions of USD through call centers operating in Uganda, Africa. He is an Indian national and occasionally visits India,” Dhaliwal said.
The accused Armarkar, allegedly defrauded the victims of around $6 million via phony call centers in Uganda. Later, the technical inputs provided by the FBI helped Delhi police arrest the accused from Ahmedabad, India, apparently the place from where he was operating a segment of the syndicate.
Keeping in mind the severity of the situation, the Delhi Police established several teams of IFSO and Counter Intelligence/Special Cell to investigate on the issue.
Armarkar’s arrest was followed by the Delhi police tracking down the alleged leader of the syndicate, Vatsal Mehta. Further investigation led to the arrest of two more accused, Deepak Arora and Prashant Kumar. According to the police, the accused were on the FBI radar for a very long time.
As part of the coordinated action, the FBI has interviewed over 50 victims so far and collected evidence of fraud amounting to more than 20 million USD, which will be produced in court as per procedure. “Two victims from the US have also been examined through video calling by IFSO (Intelligence Fusion & Strategic Operations),” the officials noted.
The First Information Report (FIR) was lodged against the four accused under section 419 (cheating done by impersonation), 420 (cheating), 384 (extortion), 120B (criminal conspiracy), 34 (acts by many in furtherance of common intention) of the Indian Penal Code and sections 66C (identity theft) and 66D (impersonation) of the IT Act.
According to Secretary General Jurgen Stock, the objective of Interpol is to monitor criminal activities across the metaverse. The “sophisticated and professional” criminals are opting for advanced technological tools and tactics to commit crimes, which has to stop for the sake of online users.
As the number of people using the metaverse rises, more crimes including data theft, money laundering, crimes against children, financial fraud, ransomware, phishing, etc. could occur.
Stock believed that it was essential for Interpol to remain relevant and implement new technology as they were developed. He stressed the importance of Interpol's response to the problem, emphasizing how rapidly criminals are adopting new technologies for their illicit activities.
He also noted that the company’s authorities run short of necessary resources at times, in order to carry out their jobs effectively. They have seen firsthand how if action is delayed, trust in the agency's resources and, consequently, the metaverse, may as well be tarnished. Such services are currently available, and criminals are already using them.
Interpol's virtual reality (VR) realm offers law enforcement a glimpse into the metaverse and a preview of the kinds of crimes that might be committed there through its secured servers. This further gives law enforcement personnel an opportunity to learn about the challenges of policing in the metaverse and test out potential solutions.
However, Interpol’s Executive Director of Technology and Innovation Madan Oberoi notes that the firm is having trouble defining what constitutes a crime in the metaverse and spreading awareness of such crimes. “There are crimes where I don’t know whether it can still be called a crime or not. If you look at the definitions of these crimes in physical space, and you try to apply it in the metaverse, there is a difficulty,” he says.
Moreover, the organization also asserts that one of its main tasks is informing the public about these issues. According to Oberoi, law enforcement agencies must make sure to educate themselves about the metaverse in order to effectively assist victims or potential victim users of crimes pertaining to the metaverse.
In order to efficiently combat cybercrime, one of the best solutions Interpol may implement is to deal with regulating criminal acts in the metaverse and encourage law enforcement agencies to keep up with the technology's rapid advancement. Interpol promises to be in full force in assisting with criminal investigations and crime-solving. Interpol and its 195 member nations will cooperate to combat global cybercrime.
As claimed by the authorities, both of the mentioned situations have given rise to newer opportunities for online criminals to rake in large assets without risking being caught.
This growth has a direct impact on the rest of the world, where many victims of “hugely lucrative” fraud live, a senior police official says.
According to Prof. Landry Signé, a senior scholar and study author at Brookings Institution, the Covid-19 crisis has apparently resulted in the growth of digitalization globally. As online activities boosted, criminals, targeted critical digital infrastructure.
“The Covid-19 pandemic has accelerated digitalization around the world, but as life has shifted increasingly online, cybercriminals have exploited the opportunity to attack vital digital infrastructure […] States across Africa have emerged as a favorite target of cybercriminals, with costly consequences,” says Professor Signé.
Nigerian Black Axe Gang
Interpol describes online frauds like banking and credit card frauds as the most pervasive and severe cyber threat across Africa. The Covid-19 pandemic has resulted in a sustained rise in the number and advancement of cyber-attacks, with more than half being targeted at online banking platforms, as per the analysts.
A major operation organized by Interpol this month, across 14 countries, emphasises the scale of cybercrimes across the continent and beyond.
Police later detained more than 70 alleged fraudsters in connection with the Nigerian cyber threat group known as ‘Black Axe’ in South Africa, Nigeria, and Ivory Coast, as well as in the Middle East, Europe, south-east Asia, and the US.
Moreover, about 50 residents were being investigated, with $1 million confiscated from bank accounts. Additionally, an apartment building, three vehicles, tens of thousands of dollars, and about 12,000 sim cards were seized.
Reportedly the Black Axe gang started out as a student organization, originating in Benin City, in the 1970s and later evolved into a worldwide criminal network, specializing in frauds. As per the US court filings, the group later claimed a regional headquarters in South Africa in the year 2013.
Authorities reportedly discovered phones and other equipment that were known to be used by Black Axe scammers, in Ireland. While tracing the group’s vocabulary, the investigators linked the group to West Africa.
A former South African criminal intelligence official says that although the fraudulent activities have comparatively reduced, one cannot assume that the organization has ceased operations. The official continued that these criminals manage their operations very well, and they have found solutions to all the issues.
A Major Base for Organized Crimes
As reported by The Guardian, South Africa has emerged as a headquarter for organized crimes.
South Africa apparently hosts the Black Axe organization, while also helping them proliferate worldwide. In this regard, Interpol further said, “as well as hosting Black Axe groups, South Africa also helps enable their spread to other parts of the world … Black Axe members come to South Africa to obtain South African citizenship, which facilitates their travel to the US, Europe or Dubai.”
Along with other acts of cyber fraud, threat actors in Africa generally targets victims via online dating services and apps, deceiving them into false relationships in order to acquire money or sensitive information about the victims.
Not only South Africa, Kenya as well has evolved into a significant base for digital extortion schemes, believes the FBI and Interpol. Thus, making the continent a major base for cybercrime activities.
Interpol announced the arrest of 12 individuals under suspicion of core members of transnational sextortion ring.
The arrests happened in July and August because of a joint investigation done by Interpol's cybercrime division and police in Singapore and Hongkong.
Under the Banner #YouMayBeNext, supported by 75 INTERPOL member countries and 21 private and public entities, the campaign focuses specifically on sextortion, Distributed Denial of Service (DDoS), and ransomware attacks.
In an example of the challenges these cyber attacks represent, international police operations supported by INTERPOL has found and tracked down transnational sextortion ring that was able to extract around USD 47,000 from targets.
As of now, the investigation has tracked 34 back to the syndicate.
Sextortion is considered a criminal act and is a form of sexual exploitation that includes harrassing an individual, either via threat or manipulation, into making sexually explicit content and sending it over the internet.
The suspects reached out to potential victims through online dating and sex platforms, then lure them into downloading a malicious mobile app and trick them into "naked chats."
The suspects used this app to hack victim's phone contact lists, then threaten victims by blackmailing to leak their nude videos to their relatives and friends.
The victims of the sextortion racket are mostly from Hongkong and Singapore.
Raymond Lam Cheuk Ho, Acting Head of the Hong Kong Police’s Cyber Security and Technology Crime Bureau said:
"We conducted a proactive investigation and in-depth analysis of a zombie command and control server hosting the malicious application, which – along with the joint efforts by our counterparts – allowed us to identify and locate individuals linked to the criminal syndicate.”
Besides this, Interpol has warned about a surge in sextortion incident in the recent years, the rise has been aggravated due to the Covid-19 pandemic.
It mentions the risks of the sextortion, just a click away on a malicious link or an intimate video/picture to someone can expose users to sextortion threats.
Last year, the FBI Internet Crime Complaint Center (IC3) alarmed about a sudden rise in sextortion complaints since the start of 2021. As per the experts, the attack has caused financial losses of more than $8 Million until July 2021.
The FBI got more than 16,000 sextortion complaints until July 2021, most of the victims fall between the age of 20 and 39.
How to be safe from sextortion?
Security affairs reports the following measures to stay safe from sextortion threats:
Joker's Stash opened in 2014 and was perhaps the most well-known underground carding site which gave new stolen credit card data and a guarantee of card validity. The activity gas has undergone a decline since mid-2020. The normally active administrator, Joker's Stash, had several gaps in communication. Joker's Stash, announced on January 15, 2021, that it is expected to shut down in a month - the stipulated date being February 15, 2021. The news was announced by the site's administrator through messages posted on different underground cybercrime forums where the site normally publicized its services.