• Advertise
  • SS7 Hacking
Saturday, January 28, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Razer Synapse 3.7.0731.072516 Local Privilege Escalation

    Micro Focus GroupWise Session ID Disclosure

    PHPJabbers Car Rental Script 3.0 SQL Injection

    Secure Web Gateway 10.2.11 Cross Site Scripting

    Inout Jobs Portal 2.2.2 Cross Site Scripting

    Inout Jobs Portal 2.2.2 SQL Injection

    Inout Music 5.1.1 SQL Injection

    Cacti 1.2.22 Command injection

    Inout Search Engine 10.1.3 Cross Site scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

    Microsoft Patch Tuesday, January 20,23 with 98 Bug Fixes

    Multiple bug fixes released by Qualcomm and Lenovo

    Fortinet Patched Multiple Vulnerabilities In FortiADC And FortiTester

  • Hacking Tools
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    Management of vulnerability with Wazuh Open Source XDR

    Seven Tips for Building a Banking App That is User-Friendly

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    Management of vulnerability with Wazuh Open Source XDR

  • Kali Linux

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Reconator Automated Recon For Pentesting and Bug Bounty

    Kali Linux (is!) Everywhere

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    New Python Malware Targeting Windows Devices

    New Python Malware Targeting Windows Devices

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    New Wave of Cyberattacks Targeting MS Exchange Servers

    New Wave of Cyberattacks Targeting MS Exchange Servers

  • Advertise
  • Home
  • Exploits

    Razer Synapse 3.7.0731.072516 Local Privilege Escalation

    Micro Focus GroupWise Session ID Disclosure

    PHPJabbers Car Rental Script 3.0 SQL Injection

    Secure Web Gateway 10.2.11 Cross Site Scripting

    Inout Jobs Portal 2.2.2 Cross Site Scripting

    Inout Jobs Portal 2.2.2 SQL Injection

    Inout Music 5.1.1 SQL Injection

    Cacti 1.2.22 Command injection

    Inout Search Engine 10.1.3 Cross Site scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

    Microsoft Patch Tuesday, January 20,23 with 98 Bug Fixes

    Multiple bug fixes released by Qualcomm and Lenovo

    Fortinet Patched Multiple Vulnerabilities In FortiADC And FortiTester

  • Hacking Tools
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    Management of vulnerability with Wazuh Open Source XDR

    Seven Tips for Building a Banking App That is User-Friendly

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    Management of vulnerability with Wazuh Open Source XDR

  • Kali Linux

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Reconator Automated Recon For Pentesting and Bug Bounty

    Kali Linux (is!) Everywhere

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    New Python Malware Targeting Windows Devices

    New Python Malware Targeting Windows Devices

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    New Wave of Cyberattacks Targeting MS Exchange Servers

    New Wave of Cyberattacks Targeting MS Exchange Servers

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Security

Europol Busts Cryptofraud Call Centers

by Ineedhack
January 14, 2023
in Security
0
80
SHARES
499
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

They used call center fraud to lure victims into investing in fake crypto-schemes.

Europol and Eurojust, together with judicial and law enforcement officials in Germany, Siberia and Cyprus, worked to combat organized criminal gangs involved in online crypto fraud. This operation was supported by Europol in June 2022.

According to reports, cybercriminals were using call centers. The cyber criminals lured their victims to make large investments in .

Europol established an Operational Task Force in order to investigate these criminal gangs. Europol was able to eliminate the crypto-fraud network, which had been targeting innocent people in Germany, Australia and Austria and made millions in Euros. The number of victims remains unclear due to the high volume of financial transactions that were discovered.

Action Day Details

The task force arrested 15 suspects on the Action Day of the operation. One suspect was arrested in Germany and 14 in Serbia. Additionally, 261 people were also questioned. These included 42 suspects in Bulgaria, 241 from Serbia and 3 from Germany. Some are still awaiting trial.

The authorities searched 250 places and 22 workplaces in all five countries. They also checked 5 locations in Bulgaria and 15 in Serbia. The task force searched 4 call centers and 11 homes in Serbia as well as 2 Bulgarian companies and 2 Bulgarian homes. They also checked 2 Cyprus homes.

Three hardware wallets were seized by the team, each containing approximately $1,000,000 worth of cryptocurrency and EUR 50,000 cash. The team also seize three vehicles and data backups. They also seize more than 150 computers.

What was the scam?

Europol’s states that the hackers ran the call centers from Serbia, and they used social media to promote them. They also used the tech infrastructure of Bulgaria to operate. The money was also said to have been laundered in Cyprus.

A lot of investors fell for their scheme through . From there, they were directed to criminally-managed websites. They initially asked for three-digit amounts, but later raised the amount.

The scammers contacted victims via phone, speaking their native languages (e.g. English or German). The crooks lured their victims into large investments, which they then lost. All active call centers were seized by the Task Force.

The investigation into the scam was initiated in 2021 by the Public Prosecutor’s Office in Stuttgart, Germany (PPO), and the State Office of Criminal Investigations of Baden-Wurttemberg (SOCI). In November 2022, a joint meeting was held to prepare for Action Day and receive financial and logistical support by the Task Force.

On-Ground Investigation

These are details about the various departments involved in the operations on the ground.

Bulgaria: The General Directorate National Police and Investigative Department of Sofia City PPO are under the control of the Sofia City Prosecutor’s Office

Cyprus, Crime Combating Department. Office for Executing European Investigation Orders. Letters of Request Limassol/Pafos Branch.

Germany: PPO Stuttgart, State Office of Criminal Investigations Baden-Wurttemberg and Police Headquarters of Aalen-Reutlingen

Serbia: The Special Public Prosecution Office for Combating Tech Crime. Ministry of Interior of the Republic of Serbia. Service for Combating Organized Crime.

Related News

Tags: android hackingemail hackingfacebook hackshack newshacking newshacking softwarehacking tipshacking toolsinstagram hackiphone hackingjpg exploitsim swapsimswap attackssimswap hacksmartphone hackingsms exploitss7 softwaretik tok hacktwitter hack
Ineedhack

Ineedhack

Next Post

Most Important Network Penetration Testing Checklist

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

XNU vm_map_copy_overwrite_unaligned Race Condition

2 weeks ago

This tool, “telerwaf”, protects go apps from web-based attacks

2 weeks ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise