In one of the most sweeping cybercrime crackdowns on the African continent, authorities in 14 countries arrested 260 suspected scammers in a coordinated operation led by INTERPOL. The suspects were linked to romance scams and sextortion schemes that preyed on human trust and intimacy, leaving victims emotionally scarred and nearly USD 2.8 million poorer.
A Pan-African Effort Against Digital Predators. According to INTERPOL, Operation Contender 3.0 ran from 28 July to 11 August 2025, targeting cyber-enabled crime rings that flourished on social media and dating platforms. Investigators identified over 1,463 victims across the world and seized 1,235 devices, along with forged documents, SIM cards, and servers supporting 81 malicious infrastructures.
The scams followed familiar but devastating patterns:
- Romance scams – criminals created fake profiles, stole images, and impersonated trusted figures to build online relationships, eventually pressuring victims into sending money for fabricated “emergencies” such as customs fees or courier charges.
- Sextortion – scammers manipulated victims into intimate exchanges, secretly recording video or collecting private images to blackmail them with threats of public exposure.
Cyril Gout, INTERPOL’s Acting Executive Director of Police Services, described the threat bluntly:
“Cybercrime units across Africa are reporting a sharp rise in sextortion and romance scams. The growth of online platforms has opened new opportunities for criminals, causing both financial loss and psychological harm. By working with our partners, we are dismantling these networks that prey on vulnerable individuals.”
Country Highlights
- Ghana: Police arrested 68 suspects, seized 835 devices, and uncovered USD 450,000 in losses, recovering USD 70,000. Victims were tricked with fake courier and customs schemes.
- Senegal: Authorities detained 22 suspects, who impersonated celebrities to defraud 120 victims, causing losses of USD 34,000.
- Côte d’Ivoire: A major sextortion ring was dismantled, with 24 suspects arrested and 809 victims identified. Criminals used blackmail to extract money from vulnerable targets.
- Angola: 8 suspects were arrested for creating fraudulent identities to deceive 28 victims both domestically and internationally.
The Role of Private Sector Partners
Private partners played a pivotal role in the success of the operation. Group-IB and Trend Micro supplied intelligence on domains, payment trails, and digital infrastructure. This collaboration enabled law enforcement to trace scams more effectively, dismantle operations, and improve attribution.
Group-IB CEO Dmitry Volkov highlighted the human cost:
“Cybercriminals behind romance scams and sextortion deliberately exploit deep human vulnerabilities—trust and emotional attachment. They turn genuine feelings into tools of coercion. That’s why dismantling these networks is critical not only for financial security but also for protecting victims from psychological harm.”
Why It Matters for Africa and Beyond
This operation comes just months after INTERPOL’s 2025 Africa Cyberthreat Assessment Report, which revealed that two-thirds of African member states see cybercrime as a medium-to-high proportion of overall crime. With the region’s rapid digital adoption, scammers have found fertile ground to target victims at home and abroad.
For Middle East & Africa (MEA) businesses, governments, and citizens, this case underscores the urgent need for robust cybersecurity awareness, stronger law enforcement cooperation, and investments in digital resilience.
10 Best Practices for Organizations and Users
- Raise Awareness: Launch cybersecurity training and awareness programs to educate staff and citizens on romance scams and sextortion risks.
- Secure Social Media Use: Advise employees and clients to verify online connections before sharing personal or financial information.
- Implement Incident Reporting Channels: Create safe, confidential avenues for reporting suspected sextortion or fraud attempts.
- Monitor Digital Infrastructure: Use Saintynet Cybersecurity services to track phishing domains, fake profiles, and malicious IP addresses.
- Strengthen Authentication: Enable multi-factor authentication (MFA) across accounts to reduce account takeovers.
- Limit Oversharing Online: Encourage responsible use of social media to avoid exposing personal details exploitable by scammers.
- Collaborate with Law Enforcement: Share intelligence with national cybercrime units for coordinated takedowns.
- Conduct Risk Assessments: Regularly evaluate third-party and internal vulnerabilities to scams and fraud.
- Protect Payment Systems: Monitor suspicious financial transactions and enforce stronger verification protocols.
- Support Victims: Provide psychological and legal support to individuals targeted by romance scams or sextortion.
Conclusion
The success of Operation Contender 3.0 demonstrates the power of coordinated international action. With 260 arrests, dozens of networks disrupted, and millions in fraud uncovered, the message is clear: cybercriminals who exploit human vulnerabilities are not beyond reach.
Still, the persistence of these schemes highlights a sobering reality: technology may evolve, but so do scams. Only through continued cooperation between law enforcement, private partners, and society at large can we keep pace with the evolving digital threat landscape.




