Police busts credit card fraud rings with 4.3 million victims
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的原文是关于国际执法机构破获三个大型信用卡诈骗和洗钱网络的新闻。首先,我要理解文章的主要内容。 文章提到,国际当局在11月4日展开名为“Operation Chargeback”的联合行动,涉及德国、美国、加拿大等多国调查人员。他们摧毁了三个大型网络,导致超过3亿欧元的损失,影响了430多万名持卡人。行动中逮捕了18人,包括四家德国支付服务提供商的高管,并查获了价值3500万欧元的资产。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:国际执法机构、摧毁三个网络、损失金额、影响范围、逮捕人数以及查获资产。同时,要确保语言简洁明了,不使用复杂的句子结构。 可能的结构是:国际执法机构摧毁三个网络,导致3亿欧元损失,影响430万持卡人。逮捕18人,并查获价值3500万欧元资产。 检查字数是否符合要求,并确保信息准确无误。最后,确保没有使用“这篇文章”或“文章内容总结”这样的开头。 </think> 国际执法机构摧毁三个大型信用卡诈骗和洗钱网络,涉及损失超3亿欧元,影响430多万持卡人,逮捕18人并查获价值3500万欧元资产。 2025-11-5 12:30:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

Hacker credit card

International authorities have dismantled three massive credit card fraud and money laundering networks, linked to losses exceeding €300 million ($344 million) and affecting over 4.3 million cardholders across 193 countries.

The November 4th joint action, dubbed "Operation Chargeback," included investigators from Germany, the USA, Canada, Singapore, Luxembourg, Cyprus, Spain, Italy, and the Netherlands. The operation was led by German prosecutors and the Federal Criminal Police Office, and coordinated by Eurojust and Europol.

Operation Chargeback targeted 44 suspects, including alleged network operators, payment service providers, intermediaries, and a risk manager, and resulted in the arrest of 18 individuals, including five executives from four major German payment service providers.

Wiz

In Germany, authorities conducted 29 searches across eight states, with support from over 250 officers, seizing assets worth more than €35 million in Germany and Luxembourg, including luxury vehicles, cryptocurrency, laptops, mobile phones, and other devices.

"The fraud was organised around three networks, which defrauded several million credit card users with 19 million accounts in 193 countries. The estimated value of the fraud is at least EUR 300 million. The total value of attempted fraud against card users amounts to over EUR 750 million. The arrested persons are German, British, Latvian, Dutch, Austrian, Danish, American and Canadian nationals," Eurojust said today.

"The suspects allegedly exploited the infrastructure of four major German payment service providers to process and launder the illicit transactions. Six suspects, including executives and compliance officers, are accused of colluding with the fraud networks, enabling them to access the payment infrastructure in exchange for fees," Europol added.

They are charged with using credit card data to create over 19 million fake online subscriptions on websites offering pornography, dating, and streaming services between 2016 and 2021. Credit card charges were kept low, at around €50 per month, with vague descriptions that made it harder for victims to identify unauthorized transactions.

The suspects also utilized numerous shell companies, primarily registered in the United Kingdom and Cyprus, through crime-as-a-service providers. The alleged fraudsters used these shell companies to facilitate fraudulent transactions and minimize the risk of detection and chargebacks.

"Operation Chargeback is a testament to the power of international cooperation in dismantling complex criminal networks," said Europol executive director Catherine De Bolle. "By leveraging our analytical capabilities and facilitating cross-border coordination, we have been able to bring down the networks defrauding millions of credit card users worldwide."

This week, European law enforcement also arrested nine suspected money launderers behind a cryptocurrency fraud network that stole over €600 million ($689 million) from victims worldwide.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/europol-credit-card-fraud-rings-stole-eur-300-million-from-43-million-cardholders/
如有侵权请联系:admin#unsafe.sh