• XRATOR
  • Our Experts
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

IMSI-catcher used in massive phishing campaign leads to arrests in France

Five people have been arrested in France for a massive phishing campaign that used an IMSI-catcher to siphon phone numbers and personal data.

Gwendal SmithbyGwendal Smith
February 24, 2023
in Cybercrime, News
0
IMSI-catcher used in massive phishing campaign leads to arrests in France

Five people have been arrested in France for their alleged involvement in a massive phishing campaign that used an IMSI-catcher to siphon phone numbers and personal data. The suspects are accused of sending over 420,000 fraudulent SMS messages directing victims to a fake health insurance website to steal their personal and financial data.

The IMSI-catcher phishing operation

The mode of operation of the phishing campaign is notable for the use of an IMSI-catcher, an intrusively powerful tool used by intelligence agencies and law enforcement to intercept communications on mobile networks. The IMSI-catcher mimics a mobile network’s base station and captures exchanges between users and the network. It was reportedly purchased for around €20,000 by one of the suspects.

The suspects allegedly sent over 420,000 fraudulent SMS messages to victims, leading them to a fake health insurance website. The website was designed to steal personal and financial data, including social security numbers and bank card information.

The arrests and legal proceedings

The suspects are two managers of a digital marketing firm based in Neuilly-sur-Seine and a technician, who are accused of using the IMSI-catcher to gather phone numbers and personal data to develop a “system of sending advertising messages” to mobile devices. The two drivers who assisted in the operation are under judicial control. Following a search of their premises, three vehicles, a motorcycle, eight computers, twelve mobile phones, a tracker, a few thousand euros, and three diamonds were seized.

The suspects have been charged with fraud, unauthorized use of frequencies or radio installations, and computer hacking. The two managers and the technician are in custody, while the two drivers are under judicial control.

Conclusion

The use of an IMSI-catcher in a phishing campaign is a concerning development, as these devices are normally only used by intelligence agencies or law enforcement. It highlights the need for greater regulation of these tools and increased awareness of the risks associated with mobile phone use. The arrests of the suspects in this case serve as a warning to others who may attempt similar tactics.

Tags: Data AbuseGlobal SurveillanceIMSI CatcherJusticeLaw EnforcementPhishingSpam

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    The H-Factor: Turning Human Into The Strongest Link Of Your Cybersecurity Strategy

    0 shares
    Share 0 Tweet 0
  • Understanding and Mitigating the Risk of Computer Memory Exploitation

    0 shares
    Share 0 Tweet 0
  • Three Social Impacts of Ransomware Operations

    0 shares
    Share 0 Tweet 0
  • Methods to Conduct an Insider Threat Risk Assessment

    0 shares
    Share 0 Tweet 0
  • Why Lockbit does fake cyberattacks ?

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}