Breaking

Spanish Police arrested 55 members from the Black Panthers SIM swap gang

The Spanish National Police have arrested 55 members from the ‘Black Panthers’ threat group, including the leader based out of Barcelona. The actors were operating four multiple activities including social engineering, vishing, phishing and carding.

As per the Spanish National Police report “The criminal group consisted of a network structure, made up of interconnected and perfectly defined action cells, whose division of tasks dealt with knowledge, accessibility to stolen information, and experience”.

Source: Policia

The attackers’ goal was to execute SIM swapping attacks, which is to port a target’s phone number to the attacker’s device. With this action, the hackers will gain access to the victims’ SMS and can use the same for bypassing 2FA protection on their bank accounts and manipulate the same.

Black Panthers and their cyber manipulation

The SIM swapping is done by a combination of phishing, vishing and call forwarding to impersonate the identities of individuals by conversing to mobile service provider support agents.

In certain cases, the hackers even impersonated themselves as technicians for a local office by stealing the credentials of their employees. After gaining access to the bank accounts of their targets, the amount will be transferred to several money mules in the Levantine coast.

As per the Spanish Police, ‘Black Panthers’ managed to manipulate 100 victims before their arrest, making 250,000 euros. The gang was also lively on the dark web and transacted using cryptocurrency. The hackers have used this monetary power to purchase several luxury products and resell them for even more profits.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago