Wednesday , May 14 2025

288 Dark Web Vendors Arrested In Major Marketplace Seizure

In an operation coordinated by Europol and involving nine countries, law enforcement have seized the illegal dark web marketplace “Monopoly Market” and arrested 288 suspects involved in buying or selling drugs on the dark web. More than EUR 50.8 million (USD 53.4 million) in cash and virtual currencies, 850 kg of drugs, and 117 firearms were seized. The seized drugs include over 258 kg of amphetamines, 43 kg of cocaine, 43 kg of MDMA and over 10 kg of LSD and ecstasy pills.

This operation, codenamed SpecTor, was composed of a series of separate complementary actions in Austria, France, Germany, the Netherlands, Poland, Brazil, the United Kingdom, the United States, and Switzerland.

CVSS 10.0 Flaw
Critical flaw in Siemens OZW Web Servers Enable Unauthenticated RCE

Siemens issued a security advisory (SSA-047424) for two serious vulnerabilities—CVE-2025-26389 and CVE-2025-26390—impacting the OZW672 and OZW772 web servers. These servers...
Read More
CVSS 10.0 Flaw  Critical flaw in Siemens OZW Web Servers Enable Unauthenticated RCE

Microsoft Patch Tuesday May 2025: 72 flaws, 5 Actively Exploited Zero-Day

Microsoft has released its Patch Tuesday updates for May 2025, addressing a total of 78 vulnerabilities across its product ecosystem,...
Read More
Microsoft Patch Tuesday May 2025: 72 flaws, 5 Actively Exploited Zero-Day

OTP glitch disrupted NID services across the country

NID services in Bangladesh are temporarily suspended due to issues with delivering One-Time Passwords (OTP) needed to access the NID...
Read More
OTP glitch disrupted NID services across the country

Google to pay Texas $1.4 billion for location tracking practices

Google will pay about $1.4 billion to Texas to settle two lawsuits regarding location tracking and biometric data storage without...
Read More
Google to pay Texas $1.4 billion for location tracking practices

YouTube geo-blocks at least 4 Bangladeshi TV channels in India

YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
YouTube geo-blocks at least 4 Bangladeshi TV channels in India

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Intelligence packages as basis for investigations

Europol has been compiling intelligence packages based on troves of evidence provided by German authorities, who successfully seized the marketplace’s criminal infrastructure in December 2021. These target packages, created by cross-matching and analysing the collected data and evidence, served as the basis for hundreds of national investigations. The vendors arrested as a result of the police action against Monopoly Market were also active on other illicit marketplaces, further impeding the trade of drugs and illicit goods on the dark web. As a result, 288 vendors and buyers who engaged in tens of thousands of sales of illicit goods were arrested across Europe, the United States and Brazil. A number of these suspects were considered high-value targets by Europol.

The arrests took place in the United States (153), the United Kingdom (55), Germany (52), the Netherlands (10), Austria (9), France (5), Switzerland (2), Poland (1) and Brazil (1). A number of investigations to identify additional individuals behind dark web accounts are still ongoing. As law enforcement authorities gained access to the vendors’ extensive buyer lists, thousands of customers across the globe are now at risk of prosecution as well.

Illicit marketplaces on the dark web

In the run-up to this coordinated operation, German and U.S. authorities also shut down ‘Hydra’, which was the highest-grossing dark web market with an estimated revenue of EUR 1.23 billion, in April 2022. The Hydra takedown saw EUR 23 million in cryptocurrencies seized by German authorities.

In terms of arrests, the operation was even more successful than previous operations codenamed DisrupTor (2020) with 179 and Dark HunTor (2021) with 150 arrests. It shows once more that international collaboration between police authorities is key for combatting crime on the Dark Web.

Commenting on Operation SpecTor, Europol’s Executive Director, Catherine De Bolle, said:

Our coalition of law enforcement authorities across three continents proves that we all do better when we work together. This operation sends a strong message to criminals on the dark web: international law enforcement has the means and the ability to identify and hold you accountable for your illegal activities, even on the dark web.

Europol‘s role

Europol’s European Cybercrime Centre facilitated the information exchange in the framework of the Joint Cybercrime Action Taskforce (J-CAT) hosted at the Europol headquarters in The Hague, the Netherlands. After cross-checking evidence through the Europol databases, Europol analysts prepared target packages and cross-matched reports containing valuable data to identify vendors on the dark web. Europol also coordinated the international law enforcement action.

Headquartered in The Hague, the Netherlands, Europol supports the 27 EU Member States in their fight against terrorism, cybercrime and other serious and organised forms of crime. We also work with many non-EU partner states and international organisations. From its various threat assessments to its intelligence-gathering and operational activities, Europol has the tools and resources it needs to do its part in making Europe safer.

Authorities taking part in Operation SpecTor:

  • Austria: Criminal Intelligence Service Austria with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter)
  • France: French Customs (Douane)
  • Germany: Federal Criminal Police Office (Bundeskriminalamt), Central Criminal Investigation Department of Oldenburg (Zentrale Kriminalinspektion Oldenburg), General Prosecutor’s Office in Frankfurt/Main – Cybercrime Center (Generalstaatsanwaltschaft Frankfurt/Main, Zentralstelle zur Bekämpfung der Internetkriminalität), Berlin Police (Polizei Berlin), various police departments (Dienststellen der Länderpolizeien), German Customs Investigation (Zollfahndungsämter)
  • Netherlands: National Police (Politie)
  • Poland: Central Cybercrime Bureau (Centralne Biuro Zwalczania Cyberprzestępczości)
  • Brazil: Civil Police of the State of Piauí (Polícia Civil do Estado do Piauí), Civil Police of the Federal District (Polícia Civil do Distrito Federal), National Secretariat of Public Security – Directorate of Integrated Operations and Intelligence – Cyber Operations Laboratory (Laboratório de Operações Cibernéticas da Diretoria de Operações Integradas e de Inteligência – Secretaria Nacional de Segurança Pública)
  • Switzerland: Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II)
  • United Kingdom: National Crime Agency (NCA), National Police Chiefs’ Council (NPCC)
  • United States: The Department of Justice (DOJ), Federal Bureau of Investigation (FBI), U.S. Drug Enforcement Administration (DEA), U.S. Postal Inspection Service (USPIS), U.S. Immigration and Customs Enforcement (ICE)’s Homeland Security Investigations (HSI), U.S. Customs and Border Protection (CBP), Financial Crimes Enforcement Network (FinCEN), Bureau of Alcohol, Tobacco, and Firearms (ATF), Naval Criminal Investigative Service (NCIS), Department of Defense (DOD), U.S. Food and Drug Administration (FDA) Office of Criminal Investigations, Internal Revenue Service Criminal Investigation (IRS-CI)

Check Also

Play Ransomware

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an …

Leave a Reply

Your email address will not be published. Required fields are marked *