Online Fraud - Police Agencies Recover Stolen $Millions

US and EU law enforcement agencies have separately announced major take-downs of cyber crime networks that had defrauded people of $billions. 

Law enforcement agencies in Singapore and Thailand, as well as Microsoft, were amongst the organisations that helped with the investigation. 

Both the US Department of Justice (DoJ) and Europol each claimed their operations were the biggest bust of a botnet in the world and the DoJ said Mr Wang is accused of using a botnet to hack into more than 19 million devices across almost 200 countries. 

A court-authorised international law enforcement operation led by the US Justice Department disrupted a botnet used to commit cyber attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations. The US has arrested a 35-year-old Chinese national YunHe Wang and seized assets including an expensive sports car, luxury watches and 21 properties. The Chinese man, YunHe Wang, is accused of helping assemble a vast network of infected computers, known as a botnet, that was used to carry out bomb threats, send child exploitation materials online and conduct financial fraud, amongst other schemes. The DoJ said Mr Wang is accused of using a botnet to hack into more than 19 million devices across almost 200 countries. 

Cyber criminals used the botnet to submit tens of thousands of fraudulent applications for US federal relief  during  the Covid pandemic, costing an estimated $20 million.

Meanwhile, Europol has made four arrests they also said that 8 criminals are now on the run and they will be added to European police forces' "most wanted" list. Cyber criminals use so-called botnets to take over peoples' computers and install malicious software. This software can then be used to collect data from a computer, send spam or even delete person data without the owner's knowledge. 

Nicole Argentieri, principal deputy assistant attorney general at the DOJ commented "Wang created malware that compromised millions of residential computers around the world and then sold access to the infected computers to cyber criminals." She said criminals used this access to conceal their identity and "anonymously commit a wide array of offenses". These include fraud, child exploitation and harassment, and bomb threats. 

It is estimated that more than 500,000 fraudulent unemployment insurance claims were sent from computers under his control, resulting in a loss of more than $5.9bn (£4.6bn). 

The DOJ accused Mr Wang of using the proceeds to buy $60m worth of luxury assets, and said it had seized a Ferrari, a Rolls-Royce, two BMWs and several watches, as well as bank accounts and crypto-currency wallets. He also bought property in the US, St Kitts and Nevis, China, Singapore, Thailand and the United Arab Emirates, it said. Mr Wang has been charged with conspiracy to commit computer fraud, substantive computer fraud, conspiracy to commit wire fraud and conspiracy to commit money laundering.  If convicted on all counts, he faces a maximum penalty of 65 years in prison. 

Europol said it had arrested the ringleaders of several cybercrime networks that used botnets. It has made arrests in Armenia and Ukraine and taken down servers across the world including in the UK, the US and Germany. More than 2,000 websites are now controlled of European law enforcement agencies.

Europol said one of the main suspects had made more than €69 million (£58m) in crypto-currency using ransomware, installing software that makes it impossible for a person to access their computer unless they pay a fee.  The malicious software got on peoples' devices mainly through through phishing attempts - such as the kind of emails people are advised not to click on - and compromised websites.  

Europol said the investigate, named Operation Endgame, is ongoing and it has plans for future arrests with further police action are to  be announced. 

DoJ   |   Europol |   BBC   |   CNN   |    AU.News   |    AoL   |    ABC  

Image: Europol

You Might Also Read: 

LockBit Resurrection:

DIRECTORY OF SUPPLIERS - Fraud Detection & Prevention:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Telecoms - Beware Of The DDoS Threat Actor
Email Encryption: What It Is & How It Works »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

NovaTech Automation

NovaTech Automation

NovaTech products and services make the world’s power grids and essential process industries more reliable, efficient, sustainable and secure.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.