Criminal Communication App Taken Down

Australian police have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests. The app’s alleged administrator, Jay Je Yoon Jung, 32, appeared in a Sydney on charges including supporting a criminal organisation and benefitting from proceeds of crime.

Investigators say that Jung developed the app specifically for criminal use in 2017 and he will remain behind bars until his case returns to court in November.

The police operation prevented 50 people from being killed, kidnapped or seriously hurt by monitoring threats amongst 125,000 messages and 120 video calls since March.

The police arrested 38 suspects in raids across four states in recent days while law enforcement agencies were also making arrests in Canada, Sweden, Ireland and Italy, Australian Federal Police Deputy Commissioner Ian McCartney said. “We allege hundreds of criminals including Italian organised crime, motorcycle gang members, Middle Eastern organised crime and Korean organised crime have used Ghost in Australia and overseas to import illicit drugs and order killings”.

Australia joined a Europol-led global taskforce targeting Ghost in 2022 and officers provided technical resources to the task force over several years that helped decrypt the communications following an initial breakthrough by French law enforcement.  

McCartney said the French had “provided a foot in the door” for police to decrypt Ghost communications and the Australian police technicians were then able to modify software updates regularly pushed out by the administrator, 

ABC   |   APNews   |   Newswek   |     Security Week   |    Independent   |   Yahoo 

Image: Sammy-Sander

You Might Also Read: 

Police First Hack Then Demolish Organised Crime Gangs:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Iran Pays $Mulitmillion Ransom To Protect Its Banks

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

JLT Specialty

JLT Specialty

JLT Specialty is a leading specialist insurance broker. Services offered include Cyber Risks insurance.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

VinCSS

VinCSS

VinCSS Internet Security Services JSC is a leading organization working in the field of researching, developing, producing products as well as providing cyber security services.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

Cyex

Cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place.