Online Fraud - Police Agencies Recover Stolen $Millions

Please log in to browse. Login now

US and EU law enforcement agencies have separately announced major take-downs of cyber crime networks that had defrauded people of $billions. 

Law enforcement agencies in Singapore and Thailand, as well as Microsoft, were amongst the organisations that helped with the investigation. 

Both the US Department of Justice (DoJ) and Europol each claimed their operations were the biggest bust of a botnet in the world and the DoJ said Mr Wang is accused of using a botnet to hack into more than 19 million devices across almost 200 countries. 

A court-authorised international law enforcement operation led by the US Justice Department disrupted a botnet used to commit cyber attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations. The US has arrested a 35-year-old Chinese national YunHe Wang and seized assets including an expensive sports car, luxury watches and 21 properties. The Chinese man, YunHe Wang, is accused of helping assemble a vast network of infected computers, known as a botnet, that was used to carry out bomb threats, send child exploitation materials online and conduct financial fraud, amongst other schemes. The DoJ said Mr Wang is accused of using a botnet to hack into more than 19 million devices across almost 200 countries. 

Cyber criminals used the botnet to submit tens of thousands of fraudulent applications for US federal relief  during  the Covid pandemic, costing an estimated $20 million.

Meanwhile, Europol has made four arrests they also said that 8 criminals are now on the run and they will be added to European police forces' "most wanted" list. Cyber criminals use so-called botnets to take over peoples' computers and install malicious software. This software can then be used to collect data from a computer, send spam or even delete person data without the owner's knowledge. 

Nicole Argentieri, principal deputy assistant attorney general at the DOJ commented "Wang created malware that compromised millions of residential computers around the world and then sold access to the infected computers to cyber criminals." She said criminals used this access to conceal their identity and "anonymously commit a wide array of offenses". These include fraud, child exploitation and harassment, and bomb threats. 

It is estimated that more than 500,000 fraudulent unemployment insurance claims were sent from computers under his control, resulting in a loss of more than $5.9bn (£4.6bn). 

The DOJ accused Mr Wang of using the proceeds to buy $60m worth of luxury assets, and said it had seized a Ferrari, a Rolls-Royce, two BMWs and several watches, as well as bank accounts and crypto-currency wallets. He also bought property in the US, St Kitts and Nevis, China, Singapore, Thailand and the United Arab Emirates, it said. Mr Wang has been charged with conspiracy to commit computer fraud, substantive computer fraud, conspiracy to commit wire fraud and conspiracy to commit money laundering.  If convicted on all counts, he faces a maximum penalty of 65 years in prison. 

Europol said it had arrested the ringleaders of several cybercrime networks that used botnets. It has made arrests in Armenia and Ukraine and taken down servers across the world including in the UK, the US and Germany. More than 2,000 websites are now controlled of European law enforcement agencies.

Europol said one of the main suspects had made more than €69 million (£58m) in crypto-currency using ransomware, installing software that makes it impossible for a person to access their computer unless they pay a fee.  The malicious software got on peoples' devices mainly through through phishing attempts - such as the kind of emails people are advised not to click on - and compromised websites.  

Europol said the investigate, named Operation Endgame, is ongoing and it has plans for future arrests with further police action are to  be announced. 

DoJ   |   Europol |   BBC   |   CNN   |    AU.News   |    AoL   |    ABC  

Image: Europol

You Might Also Read: 

LockBit Resurrection:

DIRECTORY OF SUPPLIERS - Fraud Detection & Prevention:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Telecoms - Beware Of The DDoS Threat Actor
Email Encryption: What It Is & How It Works »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.