DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

95 e-commerce fraudsters arrested in international operation – Europol

Posted on June 19, 2018 by Dissent

From Europol:

95 professional fraudsters and members of internet-based criminal networks suspected of online fraud activities were arrested during the 2018 e-Commerce Action (eComm 2018), a joint law enforcement operation supported by 28 countries1 from 4 to 15 June 2018. The main goal was to target online fraud through a coordinated law enforcement action within the European Union (EU) and beyond, followed by an awareness-raising campaign. This action also marks the start of several investigations with more arrests expected in the next few months. The activity was inspired by a similar UK pilot conducted in collaboration with Visa.

The suspects arrested during the operation were responsible for more than 20 000 fraudulent transactions with compromised credit cards, with an estimated value exceeding EUR 8 million. The action was coordinated by the European Cybercrime Centre (EC3) from Europol’s headquarters in The Hague. It received the direct assistance from merchants, logistic companies, and banks and payment card schemes. Europol also supported national authorities on-the-spot by providing analytical services in their investigations.

The e-commerce action combats card-not-present fraud, aiming for a safer online environment for customers worldwide by sharing information and developing best practices between law enforcement and the private sector. Police officers in their respective countries team up with merchants, logistics firms, financial institutions and analytical companies to find evidence of professional fraudsters. This year almost 200 private partners joined law enforcement during this action.

After several months of preparation, over 11 days police carried out house searches, arrests, interviews, confiscation of fraudulently purchased goods like mobile phones or expensive clothes, financial instruments, etc. Evidence was built to support the cases all the way to prosecuting the suspects. International card schemes support the investigations when card data is from a bank overseas. Often when a fraudulent purchase is made in the EU, the card number is from a different continent.

  • More than 200 house searches
  • Around 20 000 fraudulent transactions
  • Surveillance teams deployed
  • More than 200 private sector partners
  • Confiscated electronical devices, card data, cash and drugs

FURTHER PROFESSIONALISATION

Investigative measures are very complex due to the virtual and international dimension of this crime. They revealed that not only individual fraudsters but organised crime groups are involved in this phenomenon. There are indications of professionalism and links to other forms of crime like phishing, malware attacks, creating websites and using social media platforms for frauds.

Today roughly 80% of card fraud is conducted online. Social media is used to create selling profiles (shops), advertising everything at half price. When you order something with them, the fraudsters conduct the – often very expensive – purchases with compromised credit card data. The data stolen card data is often purchased from the dark web, originally leaked by a data breach after a malware or phishing attack. When making these purchases on their websites, victims may not realise that their card data is also being stolen, to then be resold by the vendor on another fraud forum. The so-called vendors often have tens of thousands of happy customers and receive great reviews. In the end, the banks and the merchants are the ones suffering the losses of this fraudulent activity, which is up to billions of euros worldwide very year.

PREVENTION

It is always better to prevent a crime from happening. That is why this operational action is followed by a prevention and awareness-raising campaign, #BuySafePaySafe. There are a number of safety rules that can be followed in order to avoid becoming a victim of fraud:

  • make sure the device you are using to make online purchases is properly configured and the internet connection is safe;
  • using a card is a safe method of payment in online shopping as long as you exercise the same care as in other shopping;
  • there are simple warning signs that can help you identify the scam. If you are a victim of online fraud, report it to the police. If you bought the product with a credit or debit card, report it to your bank as well;
  • check your online banking service regularly. Notify your bank immediately if you see payments or withdrawals that you have not made yourself.

Read more about safe online shopping on our dedicated page: E-Commerce: tips and advice to avoid becoming a fraud victim.

The eComm 2018 is an operation created as a part of EMPACT Payment Card Fraud (PCF) led by Austria. This operation is a practical continuation of the work of the E-Commerce Working Group, a private-public partnership network established in 2014 with key stakeholders, including the Merchant Risk Council (MRC), a network of 535 e-merchants worldwide.


1 Austria, Belgium, Bulgaria, Canada, Colombia, Croatia, Denmark, Finland, France, Georgia, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Spain, Sweden, the United Kingdom and the United States.

SOURCE: Europol

 

Related posts:

  • AlphaBay and Hansa taken down in coordinated operations by FBI and Dutch National Police
Category: Commentaries and Analyses

Post navigation

← Arizona Man Sentenced to Prison for Distributed Denial of Service Attacks against Emergency Communications System and Other Municipal Websites
Hackers stole feds’ information four years ago. Now we know what criminals did with it. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.