Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled

INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled

Posted on March 13, 2026 By CWS

INTERPOL has announced a significant crackdown on cybercrime, successfully dismantling 45,000 malicious IP addresses and servers involved in phishing, malware, and ransomware activities. This global initiative, part of an extensive law enforcement operation, engaged 72 countries and territories, resulting in 94 arrests and ongoing investigations into 110 individuals. A total of 212 electronic devices and servers were seized in targeted raids.

Global Cybercrime Operation

The operation witnessed notable arrests, including 40 suspects in Bangladesh linked to various cyber offenses such as loan scams and identity theft. In Togo, ten individuals were detained for orchestrating fraud schemes from their homes. These schemes involved hacking social media accounts and engaging in social engineering tactics like romance scams and sextortion to trick victims into transferring money.

In Macau, over 33,000 fraudulent websites related to fake casinos and essential infrastructure were identified. These websites aimed to deceive users into providing personal information or making monetary transactions under false pretenses.

Operation Synergia’s Impact

This successful cybercrime crackdown marks the third phase of Operation Synergia, which spanned from July 2025 to January 2026. Previous phases in 2023 and 2024 had already led to the identification of numerous malicious servers and multiple arrests, showcasing the ongoing commitment to combating global cyber threats.

India’s Central Bureau of Investigation (CBI) is also actively targeting transnational fraud networks. Recent coordinated searches across several Indian states focused on dismantling a large-scale fraud involving a Dubai-based fintech platform named Pyypl, accused of deceiving thousands of Indian citizens.

CBI’s Efforts Against Fraud

The CBI’s investigation revealed that the fraud syndicate exploited social media, mobile apps, and encrypted messaging to lure victims with promises of high returns on investments. Initial small deposits were used to gain victims’ trust before persuading them to invest larger amounts, which were then funneled through various channels to obscure the financial trail.

Funds were rapidly transferred through mule accounts and withdrawn via international ATMs or converted into cryptocurrency. Some proceeds were funneled through virtual asset exchanges and eventually consolidated into accounts of shell companies. The CBI has frozen associated bank accounts and seized critical evidence, arresting key syndicate members, including Ashok Kumar Sharma.

The continued efforts by INTERPOL and national law enforcement agencies highlight the importance of international cooperation in tackling cybercrime. As cyber threats evolve, these collaborative operations are crucial in ensuring a safer digital environment worldwide.

The Hacker News Tags:Arrests, Cybercrime, fraud rings, global operation, international law enforcement, INTERPOL, malicious IPs, Operation Synergia, Phishing, Ransomware

Post navigation

Previous Post: Major Security Breach at Loblaw: Customer Data Compromised
Next Post: Starbucks Employee Data Breach Exposes Sensitive Information

Related Posts

Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News
How to Protect the Invisible Identity Access How to Protect the Invisible Identity Access The Hacker News
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory The Hacker News
VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery VOID#GEIST Malware Campaign Unveils Advanced RAT Delivery The Hacker News
Why Critical Infrastructure Needs Stronger Security Why Critical Infrastructure Needs Stronger Security The Hacker News
Cisco Highlights Exploitation of Catalyst SD-WAN Vulnerabilities Cisco Highlights Exploitation of Catalyst SD-WAN Vulnerabilities The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Cyber Threat Targets Southeast Asian Militaries
  • International Effort Shuts Down Harmful Proxy Network
  • Starbucks Employee Data Breach Exposes Sensitive Information
  • INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled
  • Major Security Breach at Loblaw: Customer Data Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Cyber Threat Targets Southeast Asian Militaries
  • International Effort Shuts Down Harmful Proxy Network
  • Starbucks Employee Data Breach Exposes Sensitive Information
  • INTERPOL’s Major Cybercrime Bust: 45,000 IPs Dismantled
  • Major Security Breach at Loblaw: Customer Data Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News