#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Wednesday, July 2, 2025
HomeAfricaCybercriminals Arrested in West Africa in Major Interpol-Led Operation

Cybercriminals Arrested in West Africa in Major Interpol-Led Operation

Date:

Related stories

PDFs: Portable Documents or Perfect Phishing Vectors?

Cybersecurity professionals are sounding the alarm: PDF attachments are...

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...
spot_imgspot_imgspot_imgspot_img

In a significant blow to cybercriminal operations in West Africa, eight individuals have been arrested as part of Interpol’s ongoing campaign against cybercrime, specifically targeting cyber-enabled crimes in Côte d’Ivoire and Nigeria. The arrests were made during Operation Contender 2.0, an international effort aimed at disrupting organized cybercriminal syndicates in the region. The operation underscores the growing threat of cybercrime across the globe, as cybercriminals shift tactics to exploit digital vulnerabilities, particularly in emerging markets.

Cybercrime continues to evolve and pose serious risks to global economies, with West Africa emerging as a critical battleground for cybercriminal activities. As cybercriminal syndicates increasingly leverage sophisticated methods to exploit both individuals and organizations, the need for coordinated international action has never been more urgent. In response, Interpol, in partnership with local law enforcement and private sector intelligence firms, launched Operation Contender 2.0. This initiative seeks to combat cyber-enabled crimes such as phishing scams, romance fraud, and business email compromise (BEC) attacks.

This article provides an overview of the operation, the criminal activities uncovered, and the broader implications of cybercrime in West Africa. We also provide actionable advice for organizations to strengthen their defenses against these increasingly sophisticated threats.

Operation Contender 2.0: A Coordinated Strike Against Cybercrime

Operation Contender 2.0 is part of Interpol’s broader African Joint Operation Against Cybercrime (AFJOC), launched in 2021. The latest wave of this initiative focuses on dismantling cybercriminal syndicates operating primarily in Côte d’Ivoire and Nigeria. These groups have been involved in large-scale phishing scams, romance fraud, and BEC schemes, many of which have resulted in significant financial losses globally.

In one instance, a phishing scam targeting Swiss citizens resulted in losses exceeding $1.4 million. The criminals posed as buyers on small advertising platforms, luring victims into providing personal information through fraudulent payment sites. Coordinated efforts between Swiss authorities and the Ivorian Cyber Unit, supported by Interpol, led to the arrest of the main suspect behind this scheme, as well as the seizure of digital devices that are currently undergoing forensic analysis.

The investigation also revealed additional cybercriminal activities being conducted from the same location, broadening the scope of the operation. Similarly, in Nigeria, authorities arrested two individuals linked to a romance scam that defrauded a victim in Finland. This arrest was made possible by intelligence shared through Interpol’s partnerships with private cybersecurity firms like Trend Micro and Group-IB.

Key Findings and Arrests

The operation led to the following significant developments:

  • Côte d’Ivoire: Authorities dismantled a large-scale phishing operation, which targeted Swiss citizens. The phishing scam resulted in financial losses of over $1.4 million. The arrest of the main suspect also exposed additional cybercriminals at the same location conducting various fraudulent activities.
  • Nigeria: Two individuals were arrested in connection with a romance scam that defrauded a Finnish citizen. These criminals used digital assets and cryptocurrencies to launder money, a growing trend in financial grooming crimes.
  • Global Collaboration: The success of Operation Contender 2.0 is a testament to the importance of international collaboration in combating cybercrime. Countries such as Switzerland, Finland, Côte d’Ivoire, and Nigeria, alongside private sector partners, played critical roles in intelligence sharing and investigations.

10 Key Steps to Protect Against Cybercrime

To help organizations and individuals avoid falling victim to such sophisticated attacks, here are ten actionable steps to bolster cybersecurity:

  1. Enable Multi-Factor Authentication (MFA): Adding an extra layer of security to logins makes it more difficult for cybercriminals to access sensitive accounts.
  2. Regularly Update Software: Ensure that all software, including antivirus programs, is up to date to protect against vulnerabilities that cybercriminals can exploit.
  3. Conduct Phishing Awareness Training: Educate employees about the dangers of phishing and how to spot fraudulent emails or messages.
  4. Implement Strong Password Policies: Encourage the use of complex passwords and regularly change them to reduce the likelihood of credential theft.
  5. Monitor Network Traffic: Use advanced threat detection systems to monitor for unusual activity and potential cyber intrusions.
  6. Encrypt Sensitive Data: Encrypt both stored and transmitted data to protect against unauthorized access, even if data is intercepted.
  7. Limit Access to Sensitive Information: Only provide access to critical data and systems to those who absolutely need it, reducing the potential impact of insider threats.
  8. Perform Regular Security Audits: Regularly review and update your organization’s cybersecurity policies to identify and fix vulnerabilities.
  9. Utilize Endpoint Detection and Response (EDR): Implement tools that continuously monitor endpoints to quickly detect and respond to suspicious activity.
  10. Establish an Incident Response Plan: Having a well-defined incident response plan can help mitigate damage during a cyberattack, ensuring faster recovery and reducing financial losses.

Conclusion

Operation Contender 2.0 marks a critical success in the global fight against cybercrime, highlighting the value of international cooperation and intelligence sharing. As cybercriminal syndicates in West Africa continue to evolve, law enforcement agencies worldwide must remain vigilant and proactive in their efforts to dismantle these networks.

For organizations, staying ahead of cyber threats requires a robust cybersecurity posture, encompassing employee education, advanced threat detection systems, and ongoing collaboration with external security partners.

Want to stay on top of cybersecurity news? Follow us on Facebook, X (Twitter), Instagram, and LinkedIn for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here