Criminal Communication App Taken Down

Australian police have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests. The app’s alleged administrator, Jay Je Yoon Jung, 32, appeared in a Sydney on charges including supporting a criminal organisation and benefitting from proceeds of crime.

Investigators say that Jung developed the app specifically for criminal use in 2017 and he will remain behind bars until his case returns to court in November.

The police operation prevented 50 people from being killed, kidnapped or seriously hurt by monitoring threats amongst 125,000 messages and 120 video calls since March.

The police arrested 38 suspects in raids across four states in recent days while law enforcement agencies were also making arrests in Canada, Sweden, Ireland and Italy, Australian Federal Police Deputy Commissioner Ian McCartney said. “We allege hundreds of criminals including Italian organised crime, motorcycle gang members, Middle Eastern organised crime and Korean organised crime have used Ghost in Australia and overseas to import illicit drugs and order killings”.

Australia joined a Europol-led global taskforce targeting Ghost in 2022 and officers provided technical resources to the task force over several years that helped decrypt the communications following an initial breakthrough by French law enforcement.  

McCartney said the French had “provided a foot in the door” for police to decrypt Ghost communications and the Australian police technicians were then able to modify software updates regularly pushed out by the administrator, 

ABC   |   APNews   |   Newswek   |     Security Week   |    Independent   |   Yahoo 

Image: Sammy-Sander

You Might Also Read: 

Police First Hack Then Demolish Organised Crime Gangs:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« AI-Powered Translation: A Bridge Between IT & Business
Improving Threat Intelligence Sharing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

BlackBerry Security Services

BlackBerry Security Services

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.