Special Features

Black Hat and DEF CON

Suspected bank-infecting OPERA1ER crime boss cuffed

Cops reckon gang swiped as much as $30M from financial orgs


International cops have arrested a suspected "key figure" of a cybercrime group dubbed OPERA1ER that has stolen as much as $30 million from more than 30 banks and financial orgs across 15 countries.

The criminals have been active for at least four years, according to law enforcement and security researchers. During that time, they've targeted financial firms and mobile banking services with malware, phishing campaigns, and large-scale business email compromise (BEC) scams. 

BEC continues to be billion-dollar business for cybercrooks — and a top priority for law enforcement. In 2022 alone, the FBI said it received 21,832 BEC complaints with adjusted losses over $2.7 billion [PDF].

According to Interpol, which led the international task force in Operation Nervone to take down the gang's ringleader, OPERA1ER has stolen at least $11 million — but possibly as much as $30 million — from organizations across Africa, Asia, and Latin America.

"Operation Nervone is a testament to what we can achieve through international collaboration and intelligence sharing," said Bernardo Pillot, Interpol’s Assistant Director of Cybercrime Operations.

"This successful operation marks a significant step in our ongoing mission to dismantle organized cybercrime networks, showcasing the power of collective action in stemming the tide against cybercrime."

Security shop Group-IB first spotted the criminals' illicit email activity in 2018, and published research about the French-speaking gang last fall.

According to its threat intel team, the robberies start with targeted emails that trick staff at these businesses into running backdoor malware, keyloggers, and password stealers.

Crooks then use the stolen credentials from these software nasties to gain admin-level credentials for Windows domain controllers on the network and banks' back-end applications, such as their SWIFT messaging clients, which financial institutions use to send and receive details of transactions from one another.  

After the initial break-in, the stealthy smooth operators use tools including Cobalt Strike and Metasploit to maintain persistence and stay on the network for three to 12 months, slyly moving people's money between accounts before eventually withdrawing funds from ATMs using hired help.

In one heist, "a network of more than 400 mule subscriber accounts were used to quickly cash out stolen funds mostly done overnight via ATMs," the researchers said in a November 2022 report.

Group-IB has also worked with Interpol on another counter-BEC initiative code named Operation Delilah.

So it was also with Operation Nervone. Interpol's Cybercrime Directorate, Group-IB, and French telecom company Orange exchanged intel to track the criminals and pinpoint likely locations for their illegal transactions. Then, in early June, law enforcement in Côte d'Ivoire arrested a key suspect linked to attacks against financial institutions across Africa, it was announced on Tuesday.

The US Secret Service's Criminal Investigative Division and Booz Allen Hamilton DarkLabs cybersecurity researchers provided additional intelligence that led to the arrest. 

Additionally, two Interpol initiatives backed Operation Nervone: the African Joint Operation against Cybercrime and the Interpol Support Programme for the African Union in relation to Afripol. ®

Send us news
Post a comment

Routers have been rooted by Chinese spies, US and Japan warn

BlackTech crew looking to steal sensitive data traffic

International Criminal Court hit in cyber-attack amid Russia war crimes probe

Right as judges issued warrants against Putin

Ukraine accuses Russian spies of hunting for war-crime info on its servers

Russian have shifted tactics in the first half of 2023, with mixed results

TransUnion reckons big dump of stolen customer data came from someone else

Prolific info-thief strikes again

India's biggest tech centers named as cyber crime hotspots

Global tech companies' Bharat offices attract the wrong sort of interest

Here's why cloud credentials are the hottest item on criminal marketplaces

And they cost less than a box of donuts

China's national security minister rates fake news among most pressing cyber threats

He's also worried about alliances that freeze out Chinese tech

Chinese snoops stole 60K State Department emails in that Microsoft email heist

No classified systems involved apparently, but internal diplomatic notes, travel details, staff SSNs, etc

Mixin suspends deposits and withdrawals after $200m cryptocurrency heist

Cloud provider blamed for loss of 20% of exchange's capital

PhD student guilty of 3D-printing 'kamikaze' drone for Islamic State terrorists

'Research purposes' excuse didn't fly

Cryptocoin Ponzi scheme AirBit Club co-founder jailed

12 years behind bars, and ordered to forfeit $65m in illicit proceeds

US govt IT help desk techie 'leaked top secrets' to foreign nation

National defense files can earn you $55K … and espionage charges