INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。首先,我需要仔细阅读文章,抓住主要信息。 文章主要讲的是国际刑警组织最近的一次行动,他们打击了网络犯罪,包括钓鱼、恶意软件和勒索软件。他们关停了45,000个恶意IP地址和服务器,涉及72个国家和地区。还有逮捕了94人,调查了110人,查获了212个电子设备。具体案例有孟加拉国的40人被逮捕,涉及贷款、工作骗局、身份盗窃和信用卡诈骗;多哥的10人被逮捕,涉及社交工程骗局,比如 romance scams 和 sextortion;还有澳门查获了33,000多个钓鱼网站,涉及假赌场和关键基础设施。 另外还提到印度CBI针对一个迪拜的金融科技平台Pyypl进行调查,涉及大规模的在线投资和兼职工作诈骗。他们利用社交媒体和加密通讯引诱受害者投资,并通过多个账户转移资金,甚至转换成加密货币。 所以总结的时候需要涵盖国际刑警组织的行动规模、涉及的国家和地区、逮捕人数、查获设备数量以及具体的案例情况。同时还要提到印度CBI的相关行动。 控制在100字以内的话,可能需要简化一些细节。比如国际刑警组织关停4.5万个恶意IP地址和服务器,涉及72个国家和地区;逮捕94人;孟加拉国、多哥和澳门的具体案例;印度CBI打击迪拜Pyypl平台的诈骗案。 这样组合起来应该能在一个句子内表达清楚主要内容。 </think> 国际刑警组织关停4.5万个恶意IP地址和服务器,并逮捕94名犯罪嫌疑人。孟加拉国、多哥和澳门分别查获大量电子设备及网络犯罪证据。印度CBI则针对迪拜Pyypl平台展开调查,打击跨国金融诈骗活动。 2026-3-13 15:20:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency's ongoing efforts to dismantle criminal networks, disrupt emerging threats, and safeguard victims from scams.

The effort is part of an international law enforcement operation that involved 72 countries and territories. It also led to the arrest of 94 people, with another 110 individuals still under investigation. A total of 212 electronic devices and servers were seized during raids at various key locations.

One such operation in Bangladesh saw 40 suspects arrested and 134 electronic devices confiscated pertaining to a wide range of cybercrime offences, including loan and job scams, identity theft, and credit card fraud.

In Togo, authorities apprehended 10 suspects accused of running a fraud ring from a residential area. While some were involved in hacking into social media accounts, others conducted social engineering schemes, including romance scams and sextortion.

The fraudsters, after gaining unauthorized access to a victim's account, reached out to their online contacts, impersonating the account holder to engage in fake romantic relationships and deceive friends and family members. The ultimate objective of the scam was to trick the secondary victims into making money transfers.

Lastly, Macau law enforcement officials identified more than 33,000 phishing and fraudulent websites related to fake casinos and critical infrastructure, such as banks, governments, and payment services. These websites were set up to defraud victims by instructing them to top up their balances or enter personal information.

The cybercrime crackdown marks the third phase of Operation Synergia, which took place between July 18, 2025, and January 31, 2026. The previous two phases took place in 2023 and 2024, identifying thousands of malicious servers and scores of arrests.

India's CBI Targets Transnational Fraud Case

The disclosure comes as India's Central Bureau of Investigation (CBI) said it conducted coordinated searches at 15 locations across Delhi, Rajasthan, Uttar Pradesh, and Punjab as part of a large-scale organized online investment and part-time job fraud primarily involving a Dubai-based fintech platform called Pyypl.

"It was alleged that thousands of unsuspecting Indian citizens were cheated of crores of rupees through deceptive online schemes operated by an organized transnational fraud syndicate," the CBI said.

The criminal network is said to have leveraged social media platforms, mobile applications, and encrypted messaging services to lure victims with promises of high returns from online investments and part-time job opportunities.

As highlighted by Proofpoint in October 2024, these scams aim to gain victims' trust by convincing them to deposit small amounts and show fictitious profits on fake sites, after which they are persuaded to invest larger sums of money.

As soon as the funds are deposited, they are quickly transferred through multiple mule bank accounts to cover up the money trail and then cashed out through offshore ATM withdrawals using debit cards enabled for international transactions and via wallet top-ups on overseas fintech platforms like Pyypl using Visa and Mastercard payment networks.

These withdrawals, per the CBI, appeared as point-of-sale (PoS) transactions in banking systems to fly under the radar. Some of the stolen money has also been converted to cryptocurrency, and consolidated into accounts linked to 15 shell companies and routed through two entities.

"These entities converted the proceeds into USDT through India-based virtual asset exchanges and transferred the cryptocurrency to their white-listed wallets," the CBI added.

The crime investigating agency has identified Ashok Kumar Sharma and other unnamed co-conspirators as key members of the syndicate. Sharma has been taken into custody. It also said various bank accounts used by the entities have been frozen, and incriminating documents and digital evidence related to the syndicate's day-to-day operations have been seized.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/interpol-dismantles-45000-malicious-ips.html
如有侵权请联系:admin#unsafe.sh