• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

IMSI-catcher used in massive phishing campaign leads to arrests in France

Five people have been arrested in France for a massive phishing campaign that used an IMSI-catcher to siphon phone numbers and personal data.

Gert Van de VenbyGert Van de Ven
February 24, 2023
in Cybercrime, News
0
IMSI-catcher used in massive phishing campaign leads to arrests in France

Five people have been arrested in France for their alleged involvement in a massive phishing campaign that used an IMSI-catcher to siphon phone numbers and personal data. The suspects are accused of sending over 420,000 fraudulent SMS messages directing victims to a fake health insurance website to steal their personal and financial data.

The IMSI-catcher phishing operation

The mode of operation of the phishing campaign is notable for the use of an IMSI-catcher, an intrusively powerful tool used by intelligence agencies and law enforcement to intercept communications on mobile networks. The IMSI-catcher mimics a mobile network’s base station and captures exchanges between users and the network. It was reportedly purchased for around €20,000 by one of the suspects.

The suspects allegedly sent over 420,000 fraudulent SMS messages to victims, leading them to a fake health insurance website. The website was designed to steal personal and financial data, including social security numbers and bank card information.

The arrests and legal proceedings

The suspects are two managers of a digital marketing firm based in Neuilly-sur-Seine and a technician, who are accused of using the IMSI-catcher to gather phone numbers and personal data to develop a “system of sending advertising messages” to mobile devices. The two drivers who assisted in the operation are under judicial control. Following a search of their premises, three vehicles, a motorcycle, eight computers, twelve mobile phones, a tracker, a few thousand euros, and three diamonds were seized.

The suspects have been charged with fraud, unauthorized use of frequencies or radio installations, and computer hacking. The two managers and the technician are in custody, while the two drivers are under judicial control.

Conclusion

The use of an IMSI-catcher in a phishing campaign is a concerning development, as these devices are normally only used by intelligence agencies or law enforcement. It highlights the need for greater regulation of these tools and increased awareness of the risks associated with mobile phone use. The arrests of the suspects in this case serve as a warning to others who may attempt similar tactics.

Tags: Data AbuseGlobal SurveillanceIMSI CatcherJusticeLaw EnforcementPhishingSpam

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}