Skip to content
  Tuesday 20 January 2026
Trending
June 25, 2025<h3>Clearspeed Secures $60M to Amplify AI Voice Risk Tech</h3> October 22, 2024Senior Large Bank Examiner – Information Technology / Cybersecurity Risk Management, Supervision & Regulation October 6, 2024Cybersecurity Officer for Sustainability Business January 16, 2026Cybersecurity Architect October 30, 2023VMware Releases Advisory for VMware Tools Vulnerabilities November 21, 2023Confidential VMs by Microsoft Azure Set to Launch in December January 16, 2026Cybersecurity Architect (DoD / Cloud Security) March 14, 2025Siemens SINEMA Remote Connect Server April 25, 2024Cybersecurity Engineer July 11, 2024Siemens RUGGEDCOM | CISA
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  INTERPOL Cracks Down on 20,000+ Malicious IPs and 69 Malware Variants in Operation Secure
Industry News

INTERPOL Cracks Down on 20,000+ Malicious IPs and 69 Malware Variants in Operation Secure

SecuredyouadmSecuredyouadm—June 11, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Cybercriminals Exploit Backdoor to Swipe Data from SonicWall Appliance

July 16, 2025

YesWeHack Bug Bounty Amplifies Security Synergy

September 15, 2025

U.S. and Dutch Authorities Take Down 39 Domains in Global Fraud Bust

In a coordinated effort, law enforcement agencies in the United States and the Netherlands have successfully dismantled 39 domains associated with a widespread Business Email Compromise (BEC) fraud network. The scam, which targeted businesses and individuals worldwide, involved sophisticated tactics to deceive victims into transferring funds to fraudulent accounts.

The operation, which was months in the making, involved collaboration between multiple agencies and international partners to track down and shut down the fraudulent domains. This joint effort serves as a testament to the commitment of authorities to combat cybercrime and protect individuals and businesses from falling victim to such scams.

The BEC fraud network was responsible for defrauding countless victims out of millions of dollars through deceptive emails and fake websites. The takedown of these domains is a significant blow to the criminal organization behind the scheme and will undoubtedly disrupt their operations moving forward.

Authorities are urging individuals and businesses to remain vigilant against BEC scams and to report any suspicious emails or websites to law enforcement. By working together and staying informed, we can all play a role in combating cybercrime and safeguarding our online security.

This successful operation highlights the importance of international cooperation in combating cyber threats and sends a clear message to criminals that law enforcement agencies are united in their efforts to bring them to justice. As technology continues to evolve, it is crucial for authorities to stay one step ahead of cybercriminals and protect the public from falling victim to their schemes.

February 1, 2025

AdaCore and CodeSecure Unite to Revolutionize Developer Tools

June 20, 2025



On June 11, 2025, INTERPOL made an announcement regarding the successful dismantling of over 20,000 malicious IP addresses and domains associated with 69 information-stealing malware variants. This operation, dubbed Operation Secure, was carried out between January and April 2025, with the collaboration of law enforcement agencies from 26 countries. The efforts involved identifying servers, mapping physical networks, and executing targeted takedowns, resulting in the removal of 79% of suspicious IP addresses.

According to INTERPOL, participating countries seized 41 servers and over 100 GB of data, leading to the arrest of 32 suspects involved in illegal cyber activities. Vietnamese authorities arrested 18 suspects and confiscated devices and documents worth $11,500. Additionally, house raids in Sri Lanka and Nauru led to the arrest of 12 individuals and two individuals, respectively. The Hong Kong Police identified 117 command-and-control servers hosted across 89 internet service providers, used for launching malicious campaigns such as phishing and online fraud.

Countries involved in Operation Secure include a wide range of nations, such as Brunei, Cambodia, India, Japan, Malaysia, Philippines, South Korea, and Vietnam, among others. This operation followed the recent seizure of 2,300 domains associated with the Lumma Stealer malware. Information stealers, sold on the cybercrime underground, enable threat actors to gain unauthorized access to target networks by extracting sensitive data like browser credentials, passwords, and credit card details.

Group-IB, a Singapore-headquartered company that participated in the operation, provided crucial intelligence related to compromised user accounts by stealer malware like Lumma and RisePro. CEO Dmitry Volkov highlighted the significance of preventing cybercriminals from using stolen data for financial fraud and ransomware attacks. The stolen information is often monetized on forums, paving the way for follow-on attacks like data breaches and business email compromise. This successful operation underscores the ongoing battle against cyber threats and the importance of international cooperation in combating cybercrime.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

5 Must-Know River Island Tips!
Pre-Sales Solutions Architect (CyberSecurity Software Company) – USA
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures