Law enforcement dismantled gang behind Operation Triangle Phishing Campaign

A joint international operation led to the dismantling of a criminal gang who is behind the Operation Triangle phishing campaign.

A joint effort of Law enforcement from six countries, including Italy, Spain, Poland,Belgium, the U.K., and Georgia, allowed the arrest of 49 suspects fraudsters.

Twenty individuals were arrested in Italy, 10 in Spain, 18 in Poland, and one suspect was arrested in Belgium.

The alleged cyber criminals were involved in a complex phishing scheme dubbed Operation Triangle that allowed cybercriminals to steal more than $6 million.

Yesterday, a joint international operation led to the dismantling of a group of cybercriminals active in Italy, Spain, Poland, the United Kingdom, Belgium and Georgia, who are suspected of committing financial fraud involving email account intrusions. The operation resulted in the arrest of 49 suspected members of the criminal group” states a press release from Eurojust and Europol.

According the first information related to the criminal organization dismantled, the crew was composed of individuals from Cameroon, Nigeria, and Spain that implemented a phishing campaign (Operation Triangle) to steal data from their victims through man-in-the-middle attacks.

The fraudsters took over email accounts of victims from businesses across Europe, the crooks used social engineering techniques and also malware-based attacks. Once hacked the email accounts of the victims they hijacked the payment to themselves instead of the legitimate individuals. With this tactic, the gang cashed out nearly €6 million by using “sophisticated network of money laundering transactions,” outside the EU.

“The modus operandi used by this criminal group is the so-called man-in-the-middle and involved repeated computer intrusions against medium and large European companies through hacking (malware) and social engineering techniques. Once access to companies’ corporate email accounts was secured, the offenders monitored communications to detect payment requests. The company’s customers were then requested by the cybercriminals to send their payments to bank accounts controlled by the criminal group. ” continues the Europol.

The law enforcement seized laptops, hard disks, tablets, telephones, credit cards and cash, SIM cards, memory sticks, forged documents and bank account documents.

Just a month ago, law enforcement dismantled another organization which was also composed by Nigerian fraudsters that have stolen more thank $3 million via online fraud.

Pierluigi Paganini

(Security Affairs –  Operation Triangle, cybercrime)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

7 mins ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

29 mins ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

6 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

17 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

24 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

This website uses cookies.