Online Fraud - Police Agencies Recover Stolen $Millions

US and EU law enforcement agencies have separately announced major take-downs of cyber crime networks that had defrauded people of $billions. 

Law enforcement agencies in Singapore and Thailand, as well as Microsoft, were amongst the organisations that helped with the investigation. 

Both the US Department of Justice (DoJ) and Europol each claimed their operations were the biggest bust of a botnet in the world and the DoJ said Mr Wang is accused of using a botnet to hack into more than 19 million devices across almost 200 countries. 

A court-authorised international law enforcement operation led by the US Justice Department disrupted a botnet used to commit cyber attacks, large-scale fraud, child exploitation, harassment, bomb threats, and export violations. The US has arrested a 35-year-old Chinese national YunHe Wang and seized assets including an expensive sports car, luxury watches and 21 properties. The Chinese man, YunHe Wang, is accused of helping assemble a vast network of infected computers, known as a botnet, that was used to carry out bomb threats, send child exploitation materials online and conduct financial fraud, amongst other schemes. The DoJ said Mr Wang is accused of using a botnet to hack into more than 19 million devices across almost 200 countries. 

Cyber criminals used the botnet to submit tens of thousands of fraudulent applications for US federal relief  during  the Covid pandemic, costing an estimated $20 million.

Meanwhile, Europol has made four arrests they also said that 8 criminals are now on the run and they will be added to European police forces' "most wanted" list. Cyber criminals use so-called botnets to take over peoples' computers and install malicious software. This software can then be used to collect data from a computer, send spam or even delete person data without the owner's knowledge. 

Nicole Argentieri, principal deputy assistant attorney general at the DOJ commented "Wang created malware that compromised millions of residential computers around the world and then sold access to the infected computers to cyber criminals." She said criminals used this access to conceal their identity and "anonymously commit a wide array of offenses". These include fraud, child exploitation and harassment, and bomb threats. 

It is estimated that more than 500,000 fraudulent unemployment insurance claims were sent from computers under his control, resulting in a loss of more than $5.9bn (£4.6bn). 

The DOJ accused Mr Wang of using the proceeds to buy $60m worth of luxury assets, and said it had seized a Ferrari, a Rolls-Royce, two BMWs and several watches, as well as bank accounts and crypto-currency wallets. He also bought property in the US, St Kitts and Nevis, China, Singapore, Thailand and the United Arab Emirates, it said. Mr Wang has been charged with conspiracy to commit computer fraud, substantive computer fraud, conspiracy to commit wire fraud and conspiracy to commit money laundering.  If convicted on all counts, he faces a maximum penalty of 65 years in prison. 

Europol said it had arrested the ringleaders of several cybercrime networks that used botnets. It has made arrests in Armenia and Ukraine and taken down servers across the world including in the UK, the US and Germany. More than 2,000 websites are now controlled of European law enforcement agencies.

Europol said one of the main suspects had made more than €69 million (£58m) in crypto-currency using ransomware, installing software that makes it impossible for a person to access their computer unless they pay a fee.  The malicious software got on peoples' devices mainly through through phishing attempts - such as the kind of emails people are advised not to click on - and compromised websites.  

Europol said the investigate, named Operation Endgame, is ongoing and it has plans for future arrests with further police action are to  be announced. 

DoJ   |   Europol |   BBC   |   CNN   |    AU.News   |    AoL   |    ABC  

Image: Europol

You Might Also Read: 

LockBit Resurrection:

DIRECTORY OF SUPPLIERS - Fraud Detection & Prevention:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Telecoms - Beware Of The DDoS Threat Actor
Email Encryption: What It Is & How It Works »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

Black Bison Cyber

Black Bison Cyber

Black Bison Cyber is a premier cybersecurity firm specializing in elite, discreet, and highly personalized digital protection for high-profile individuals and executives.