Sweden, Finland partner to take down Sipulitie criminal marketplace

Avatar

An online haven for the sale of narcotics and other criminal goods in Scandinavia was shut down and had its servers seized by law enforcement agencies in Sweden and Finland.

Launched in February 2023 on the Tor network, the Sipulitie marketplace originally focused on Finland before expanding to cover other Scandinavian countries. A predecessor was created in April 2019 but was shut down by Finnish Customs and Polish authorities in December 2020.

Finnish authorities said their investigation revealed the identity of the administrator of both sites as well as other people who served as moderators and customer service agents. Police agencies were also able to identify people who sold and bought things on the platform. 

Finnish Customs said it worked with Swedish Police, Europol and police units in Finland, adding that their investigation is ongoing. Officials did not say if the takedown involved arrests, but network servers for the platform were seized and the Tor website was shut down. 

The administrator of the platform, who was not named, was seen boasting that the site generated more than €1.3 million  (about $1.4 million) throughout its time in operation, according to Finnish Customs. Users conducted sales in both Finnish and English. 

Hannu Sinkkonen, director of enforcement at Finnish Customs, said the takedown was one of several his agency has conducted. 

“Over the years, we at Finnish Customs have intervened effectively using many different methods in the criminal activities taking place on the dark web,” Sinkkonen said

Bitdefender Chief Security Strategist Alex Cosoi told Recorded Future News that their researchers provided Finnish Customs with information to aid their investigation into the platform. 

Cosoi said they also assisted with the 2020 take down of Sipulitie’s predecessor. He explained that the operation should serve as “a message to criminals who believe the dark web covers their actions and guarantees their anonymity.” 

“If they become the target of an international effort, they can’t hide,” he said. 

Last year, Finnish authorities worked with Europol to take down another dark web marketplace called PIILOPUOTI. 

The platform also operated on the Tor network, allowing people to smuggle and sell drugs as well as drug paraphernalia into Finland, according to a statement from Finnish Customs.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

Next Post

British intelligence services to protect all UK schools from ransomware attacks

Related Posts

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. "Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network configurations, user passwords,
Avatar
Read More

Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection

A security flaw has been disclosed in OpenWrt's Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and reporting the
Avatar
Read More

AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case

Cybersecurity researchers have found that it's possible to use large language models (LLMs) to generate new variants of malicious JavaScript code at scale in a manner that can better evade detection. "Although LLMs struggle to create malware from scratch, criminals can easily use them to rewrite or obfuscate existing malware, making it harder to detect," Palo Alto Networks Unit 42 researchers
Avatar
Read More