Major League Cyber Criminal Arrested

The cyber crime unit of the Nigeria Police Force have arrested a 37-year-old man who is believed to have led major phishing campaigns, business email compromise schemes and other malicious behavior that targeted companies and individuals. 

The operation was conducted by Interpol’s African Joint Operation Against Cybercrime, a recently established branch within the organisation’s cyber crime directorate. The police operation commenced last May in collaboration with private sector partners including Group-IB, Palo Alto Networks Unit 42, and Trend Micro

Interpol said they were able to research and apprehend the suspected crime gang leader in the joint operation. "The suspect is alleged to have run a transnational cybercrime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims," Interpol has said in a statement.

The suspect is alleged to have run a transnational cyber crime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims. 

“Law enforcement and cyber security firms have witnessed the striking increase in many forms of cybercrime in recent years" according to Interpol. The recent explosive increase in cyber crime has been called a “parallel pandemic” to that of COVID-19. According to Cybersecurity Ventures, by 2025, cyber crime will cost the global economy $19.5tn USD annually.

The various law enforcement agencies involved gathered intelligence on criminal activities and supplied it to the Interpol Africa unit, which also worked with police forces from Canada, Australia, and the US to track the activities. They provided a multi-continental mapping of the suspect’s movements as he journeyed from one country to another, ultimately leading to the arrest at Murtala Mohammed International Airport in Lagos. “This case underlines both the global nature of cybercrime and the commitment required to deliver a successful arrest through a global to regional operational approach in combatting cybercrime,” said Bernardo Pillot, Interpol’s Assistant Director, Cybercrime Operations..

Garba Baba Umar, assistant inspector general of the Nigeria Police Force and head of Nigeria’s Interpol National Central BureauI said "I hope the results of Operation Delilah will stand as a reminder to cyber criminals across the world that law enforcement will continue to pursue them, and that this arrest will bring comfort to victims of the suspect’s alleged campaigns,” 

This  operation marks a step forward in internationally coordinated efforts to address the increasingly global nature of cyber crime.

Interpol:     Security Affairs:     Oodaloop:     Infosecurity Magazine:    SC Magazine:    The Hacker News:

You Might Also Read: 

A Short History Of Cyber Crime & Its Motivations:

 

« Facing Facts On Facial Recognition
Cyber Crime’s History - Part 2 - Current Social Effects »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.