Georgia arrests ex-spy chief over alleged protection of scam call centers

Georgian prosecutors have arrested the former head of the country’s security service on multiple bribery charges, including allegations that he protected scam call centers that defrauded victims around the world.

Grigol Liluashvili, who led Georgia’s state security service from 2020 until April this year, was detained earlier this week. Before his arrest, he appeared at the Prosecutor’s Office for questioning, telling journalists he was unaware of the details of the case. Asked whether he expected to be detained, he said: “Everything is God’s will.”

Prosecutors allege that Liluashvili accepted bribes in several criminal cases, including payments in exchange for shielding fraudulent call centers operating in Georgia. Despite a government campaign against scam operations, dozens of such call centers continued to operate, prosecutors said.

According to witness testimony cited by prosecutors, most of these centers were linked to a group that financed opposition media outlets, while others allegedly operated under Liluashvili’s protection through his relative, Sandro Liluashvili. Investigators say the former security chief received roughly $1.4 million in bribes routed through his relative.

Prosecutors are also examining claims that Liluashvili and accomplices helped conceal the existence of the call centers, while opposition media outlets allegedly refrained from reporting on them despite having information.

If convicted, Liluashvili could face a prison sentence of up to 15 years.

Earlier this year, investigative journalists uncovered a major call center operating in Georgia’s capital, Tbilisi, located just meters from the headquarters of the state security service. That operation employed about 85 people and generated an estimated $35.3 million from more than 6,100 victims worldwide since May 2022.

After the report was published, prosecutors froze assets linked to the call center. In October, authorities also raided the homes of several high-profile figures, including a former prime minister, a former chief prosecutor, and Liluashvili himself. His cousin Sandro was later arrested on fraud and money-laundering charges.

Prosecutors have not publicly specified which call centers Liluashvili is accused of protecting.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Next Post

Pro-Russian hackers claim attack on French postal service operator

Related Posts

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that's capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform. The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still
Read More

⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

It’s easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show that long-term, silent breaches are becoming the norm. The best defense now isn’t just patching fast, but watching smarter and staying alert for what you don’t expect. Here’s a quick look at this week’s top threats, new tactics, and security stories shaping
Read More

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper. The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango
Read More