Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Law enforcement authorities in Europe have arrested five suspects in connection with an “elaborate” online investment fraud scheme that stole more than €100 million ($118 million) from over 100 victims in France, Germany, Italy, and Spain. According to Eurojust, the coordinated action saw searches in five places across Spain and Portugal, as well as in Italy, Romania and Bulgaria. Bank accounts

Law enforcement authorities in Europe have arrested five suspects in connection with an “elaborate” online investment fraud scheme that stole more than €100 million ($118 million) from over 100 victims in France, Germany, Italy, and Spain.

According to Eurojust, the coordinated action saw searches in five places across Spain and Portugal, as well as in Italy, Romania and Bulgaria. Bank accounts and other financial assets associated with the cybercrime ring were frozen.

The main perpetrator behind the operation has been accused of large-scale fraud and money laundering by running an online investment platform for several years, tricking unsuspecting individuals into parting with their funds by promising them high returns on investments in various cryptocurrencies.

Once the deposits were made, the funds were transferred to bank accounts in Lithuania to launder them. Victims who attempted to withdraw their assets from the platform were asked to pay additional fees, after which the website used to conduct the scam vanished.

DFIR Retainer Services

A number of judicial and law enforcement agencies from Bulgaria, Italy, Lithuania, Portugal, Romania, and Spain participated in the fraud scheme investigation.

“This fraud had been running since at least 2018, and covered 23 different countries, for instance, either as areas used to divert proceeds of the scam or as locations where victims were based,” Eurojust, which coordinated the effort along with support from Europol, said.

According to the U.S. Federal Trade Commission (FTC), Americans lost a record $12.5 billion to fraud in 2024, a 25% increase from the previous year, with investment scams resulting in the highest losses, touching $5.7 billion, up from $4.6 billion in 2023 and $3.8 billion in 2022.

“A majority (79%) of people who reported an investment-related scam lost money, with a median loss of over $9,000,” the FTC said. “People lost over $3 billion to scams that started online, compared to approximately $1.9 billion lost to more ‘traditional’ contact methods like calls, texts, or emails.”

The disclosure comes as Chainalysis revealed how a Venus Protocol user was targeted on September 2, 2025, in a social engineering attack, and how early detection and swift action enabled the recovery of stolen funds worth approximately $13 million.

“The attack was rooted in social engineering: malicious actors used a compromised Zoom client to gain system access,” Chainalysis said.

Image Source: Chainalysis

“After infiltrating the victim’s machine, the attackers manipulated the user into submitting a blockchain transaction, which granted them delegate status over the account. This gave them direct control to borrow and redeem assets on behalf of the victim, effectively draining funds.”

The blockchain analytics company said Venus paused its protocol within 20 minutes of the malicious transaction taking place, effectively preventing the attacker from moving the funds further. Over the next 12 hours, Venus force-liquidated the attacker’s wallet, recovered the stolen funds, and resumed full service.

CIS Build Kits

“Venus passed a governance proposal to freeze $3 million in assets still controlled by the attacker,” Chainalysis noted. “Not only did the attacker fail to profit; they actually lost $3 million as a result of the community’s decisive action.”

The Eurojust crackdown also coincides with a similar effort undertaken by the Seoul Metropolitan Police Agency (SMPA) earlier this month that disrupted a cybercrime operation, which is estimated to have stolen about $30 million from 258 high-profile victims, including corporate executives.

“The operation was sophisticated: after successfully hacking victims’ personal information and stealing funds, the criminals would impersonate agency employees and approach victims’ family members to gather even more personal data, preparing for additional thefts,” Chainalysis noted.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Previous Post

U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN

Next Post

Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

Related Posts

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp a worm that deploys a banking trojan in attacks targeting users in Brazil. The latest wave is characterized by the attackers shifting from PowerShell to a Python-based variant that spreads the
Read More

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for orchestrating a string of data theft and extortion attacks. "Both groups have recently been observed targeting organizations' Salesforce platforms via different initial access mechanisms," the FBI said.
Read More