Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific
African Cybercrime Operations Shut Down in Law Enforcement Operation
Interpol- and Afripol-led crackdown disrupts cybercrime ecosystem responsible for some $40 million in losses to victims.
In a months-long joint operation by Interpol and Afripol, 14 suspected cybercriminals have been arrested and more than 20,000 suspicious computer networks shut down across 25 African countries.
Law enforcement arrested three suspects in Cameroon and one in Nigeria, and authorities took down two Cameroonian Dark Web websites as well as 615 Kenyan malware hosters. In addition, 185 Internet protocol (IP) addresses shut down in Gambia due to malicious activity, and two money mules were arrested in Mauritius after being linked to scams via messaging platforms.
The so-called Africa Cyber Surge II operation, first launched in April, was led by Interpol's Cybercrime Directorate under the Interpol Africa Cybercrime Operations desk as well as Interpol's Support Programme for the Africa Union.
The investigation used private sector intelligence to identify rogue networks that were responsible for financial losses of more than $40 million. According to Interpol, the operation underscores the power of cooperation among international law enforcement, national authorities, and private sector partners "to share best practices and pro-actively combat cybercrime" especially in a region that has seen a surge in cybercrime.
"The Africa Cyber Surge II operation has led to the strengthening of cybercrime departments in member countries as well as the solidification of partnerships with crucial stakeholders, such as computer emergency response teams and Internet Service Providers," Interpol Secretary General Jurgen Stock stated. "This will further contribute to reducing the global impact of cybercrime and protecting communities in the region."
Read more about:
DR Global Middle East & AfricaAbout the Author
You May Also Like
The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024