Feeds

Scotland Yard cuffs six in megaquid phish ring probe

Operation Dynamophone nabs suspects

Top 5 reasons to deploy VMware with Tegile

Six suspected fraudsters have been arrested in the UK and Ireland over their alleged involvement in a bank and credit card phishing scam that affected tens of thousands of victims and resulted in losses of millions of pounds.

Five men and one woman, aged 25 to 40, were arrested in London and County Meath, Ireland on Tuesday and Wednesday following an investigation led by officers from the Met's Police Central e-Crime Unit (PCeU). The five UK suspects, all arrested following raids on addresses in London, remain in custody in central London pending further police inquiries. Each faces possible computer fraud and hacking charges.

The arrests were part of Operation Dynamophone, an investigation by the PCeU into a sophisticated phishing fraud network that systematically harvested online bank account passwords and credit card numbers. The MPS Territorial Support Group and the Irish Garda Síochána Fraud Investigation Bureau assisted the PCeU in serving warrants on the six suspects.

Police reckon 10,000 online bank accounts and 10,000 credit cards have been compromised as part of a fraud that has resulted in the attempted theft of £1.14 million and losses of £358,000 from online bank accounts. The value of credit card fraud associated with the scam is less certain but estimated at more than £3m.

Detective Inspector Colin Wetherill of the PCeU said: "We have taken this action to shut down an organised criminal network running an online phishing and account take-over operation. A great deal of personal information was compromised and cleverly exploited for substantial profit. By disrupting the operation we have hopefully prevented further loss to individuals and institutions across the UK."

He added that consumers ought to follow online safety advice from sites such as getsafeonline.org to safeguard themselves against the risk of becoming the victims of online fraud.

A Met Police statement on the case can be found here. ®

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.