Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Europol’s top hacking ring takedowns

3 of 7 NEXT PREV
  • Shylock

    Shylock

    In 2014, Europol and other law enforcement agencies seized servers which provided the backbone of the Shylock malware campaign, used to attack banks and financial institutions worldwide.

    The Shylock financial Trojan, named so due to code references to Shakespeare's The Merchant of Venice, infected at least 30,000 PCs worldwide, targeting those in the UK, US, Italy, and Turkey. 

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

  • Game over, Zeus

    Game over, Zeus

    Another takedown of note in the same year was the seizure of infrastructure belonging to the operators of the Gameover Zeus botnet and CryptoLocker ransomware.

    While variants of Zeus and CryptoLocker are still found in the wild, the police operation did stop the Gameover Zeus scheme in its tracks -- albeit after victims suffered an estimated $100 million in losses. The mastermind behind Gameover Zeus, Evgeniy Mikhaylovich Bogachev, is still wanted by the FBI. 

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

  • ATM skimming

    ATM skimming

    In 2017, Europol hunted down those believed to be part of a global ATM skimming ring.

    ATM skimming involves tampering with ATM hardware or software, often through physical cameras and skimming systems, in order to swipe the card details of innocent users.

    As part of "Operation Neptune," the police arrested four Bulgarians who used the stolen data to create clone cards capable of withdrawing cash from their victims' accounts in countries including Belize, Indonesia, and Jamaica. 

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

  • Carbanak and Cobalt

    Carbanak and Cobalt

    Fast forward to 2018 and we have the arrest of the alleged operators of Carbanak and Cobalt malware campaigns by Europol. Active since 2013, the criminals conducted a series of successful heists which allowed them to cash in an estimated €10 million per successful heist, with overall theft believed to be over the €1 billion mark.  

    The group is known as Fin7. The source code for Carbanak has recently been discovered on VirusTotal. 

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

  • Counterfeit cash

    Counterfeit cash

    Another campaign foiled in 2018 was a vast plot which involved the purchase of counterfeit euro banknotes in the Dark Web.

    It's rather easy to purchase illegal goods and fake money online if you know where to look, but as this case highlighted, law enforcement is able to track down underground traders.

    In total, almost 300 house searches were conducted in 13 different countries and 235 suspects were detained. Drugs, weapons -- including guns and nunchaku -- 1,5000 banknotes and cryptocurrency stashes were also seized.

    The producer of the banknotes had been arrested months prior. Over 10,000 counterfeit notes were shipped around Europe.

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

  • Cashing in on cryptocurrency

    Cashing in on cryptocurrency

    An interesting cryptocurrency-related case was the arrest of a UK citizen for allegedly stealing $11.4 million in IOTA virtual currency.

    The thefts took place in January 2018. The man in question operated a website which promised to generate random, strong passwords for IOTA wallets, but secretly, the suspect was logging the passwords for use, later on, to break into user accounts and steal away their funds. 

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

  • Wall Street Market

    Wall Street Market

    One of Europol's most recent successes is the closure of Wall Street Market, a Dark Web marketplace which sold weapons, drugs, hacking tools, and stolen data.

    After the trading posts' operators performed an exit scam and scarpered with $14.2 million in cryptocurrency, law enforcement seized the server belonging to the website. 

    Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

    Caption by: Charlie Osborne

3 of 7 NEXT PREV
Charlie Osborne

By Charlie Osborne | June 5, 2019 -- 13:47 GMT (06:47 PDT) | Topic: Security

  • Shylock
  • Game over, Zeus
  • ATM skimming
  • Carbanak and Cobalt
  • Counterfeit cash
  • Cashing in on cryptocurrency
  • Wall Street Market

European law enforcement has smashed everything from Dark Web marketplaces to ATM skimmer rings.

Read More Read Less

ATM skimming

In 2017, Europol hunted down those believed to be part of a global ATM skimming ring.

ATM skimming involves tampering with ATM hardware or software, often through physical cameras and skimming systems, in order to swipe the card details of innocent users.

As part of "Operation Neptune," the police arrested four Bulgarians who used the stolen data to create clone cards capable of withdrawing cash from their victims' accounts in countries including Belize, Indonesia, and Jamaica. 

Published: June 5, 2019 -- 13:47 GMT (06:47 PDT)

Caption by: Charlie Osborne

3 of 7 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | June 5, 2019 -- 13:47 GMT (06:47 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums