A global coalition of police agencies has taken a significant whack at criminals accused of running a number of online scams, including phishing, the stealing of account credentials and other sensitive data, and the spreading of ransomware, Interpol said recently.
The operation, which ran from the start of April through the top of August, resulted within the arrest of 41 people and the takedown of 1,037 servers and other infrastructure running on 22,000 IP addresses. Synergia II, because the operation was named, was the work of multiple law enforcement agencies internationally, in addition to three cybersecurity organizations.
A worldwide response
“The worldwide nature of cybercrime requires a worldwide response which is obvious by the support member countries provided to Operation Synergia II,” Neal Jetton, director of the Cybercrime Directorate at INTERPOL, said. “Together, we’ve not only dismantled malicious infrastructure but additionally prevented a whole lot of 1000’s of potential victims from falling prey to cybercrime. INTERPOL is proud to bring together a various team of member countries to fight this ever-evolving threat and make our world a safer place.”
Among the many highlights of Operation Synergia II were:
Hong Kong (China): Police supported the operation by taking offline greater than 1,037 servers linked to malicious services.
Mongolia: Investigations included 21 house searches, the seizure of a server and the identification of 93 individuals with links to illegal cyber activities.
Macau (China): Police took 291 servers offline.
Madagascar: Authorities identified 11 individuals with links to malicious servers and seized 11 electronic devices for further investigation.
Estonia: Police seized greater than 80GB of server data, and authorities are actually working with INTERPOL to conduct further evaluation of information linked to phishing and banking malware.
The three private cybersecurity organizations that were a part of Operation Synergia II were Group-IB, Kaspersky, and Team Cymru. All three used the telemetry intelligence of their possession to discover malicious servers and made it available to participating law enforcement agencies. The law enforcement agencies conducted investigations that resulted in house searches, the disruption of malicious cyber activities, the lawful seizures of servers and other electronic devices, and arrests.