Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects

Interpol Taken Down 6 Ransomware Variants and Arrested 500+ Suspects

Posted on December 24, 2025December 24, 2025 By CWS

Legislation enforcement businesses throughout 19 African nations have achieved a landmark victory in opposition to cybercrime.

Arresting 574 suspects and dismantling six ransomware variants throughout Operation Sentinel, a month-long coordinated crackdown that concluded on November 27.

The operation, which ran from October 27 to November 27, focused three escalating threats: enterprise e mail compromise (BEC), digital extortion, and ransomware.

Authorities disabled over 6,000 malicious hyperlinks and recovered roughly USD 3 million in illicit funds. The investigated instances are linked to estimated losses exceeding USD 21 million.

Operation Sentinel demonstrated how swift worldwide cooperation can forestall catastrophic monetary injury.

In Senegal, a significant petroleum firm fell sufferer to a classy BEC scheme through which fraudsters infiltrated its inner e mail methods and impersonated executives to authorize a USD 7.9 million wire switch.

Senegalese authorities froze vacation spot accounts inside hours, efficiently halting the transaction.

Ghana skilled its personal important cyber incident when a monetary establishment was hit by ransomware, encrypting 100 terabytes of information and stealing roughly USD 120,000.

Via superior malware evaluation, Ghanaian authorities recognized the ransomware pressure, developed a decryption instrument, and recovered almost 30 terabytes of information whereas arresting a number of suspects.

The operation additionally dismantled a classy cyber-fraud community spanning Ghana and Nigeria that deceived greater than 200 victims of USD 400,000.

The criminals used professionally designed web sites and cell functions mimicking widespread fast-food manufacturers.

Accumulating funds however by no means delivering orders. Ghanaian authorities arrested ten suspects, seized over 100 digital units, and shut down 30 fraudulent servers.

In Benin, regulation enforcement took down 43 malicious domains and disabled 4,318 social media accounts linked to extortion schemes, leading to 106 arrests.

Cameroon’s police responded with equal urgency, stopping a car gross sales platform phishing marketing campaign and issuing an emergency financial institution freeze inside hours.

“The dimensions and class of cyberattacks throughout Africa are accelerating,” said Neal Jetton, INTERPOL’s Director of Cybercrime.

“Operation Sentinel displays African regulation enforcement’s dedication to defending livelihoods and important infrastructure.”

The operation succeeded via partnerships with private-sector leaders, together with Workforce Cymru, The Shadowserver Basis, Pattern Micro, TRM Labs, and Uppsala Safety.

This offered essential technical assist in tracing assault origins and freezing illicit belongings. Operation Sentinel concerned 19 taking part international locations and acquired assist from the UK’s Overseas, Commonwealth, and Growth Workplace via the African Joint Operation in opposition to Cybercrime (AFJOC) initiative.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Arrested, INTERPOL, Ransomware, Suspects, Variants

Post navigation

Previous Post: Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours
Next Post: Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Related Posts

Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands Cyber Security News
Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account Cyber Security News
DNS TXT Records Exploited in Advanced Cyber Attacks DNS TXT Records Exploited in Advanced Cyber Attacks Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
MacOS Users Targeted by New Phishing Email Scam MacOS Users Targeted by New Phishing Email Scam Cyber Security News
Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News