An extensive international law enforcement operation has dealt a significant blow to organized cybercrime in Africa, resulting in the arrest of 574 individuals and the seizure of $3 million. The announcement on December 23, 2025, detailed a coordinated crackdown on multiple criminal networks based in West and Central Africa. These groups were responsible for a wide array of cyber-enabled financial crimes, most notably Business Email Compromise (BEC) and ransomware. The successful operation, involving authorities in Senegal, Ghana, Benin, and Cameroon, highlights the growing international focus on disrupting cybercrime at its source.
The dismantled networks were key players in the global cybercrime ecosystem. They specialized in highly lucrative and damaging forms of fraud, including:
The operation's success in countries like Senegal, Ghana, Benin, and Cameroon is significant, as these regions have been identified as hotspots for cybercriminal activity. By arresting key individuals and seizing their assets, law enforcement aims to disrupt not just the current operations but also the underlying infrastructure and financial incentives that fuel these criminal enterprises.
While the report lacks specific TTPs for the arrested groups, BEC attacks typically follow a common pattern that law enforcement would have investigated.
T1566.002 - Spearphishing Link: Attackers often begin by compromising an email account through phishing to gain a foothold.T1114.001 - Email Collection: Local Email Collection: Once inside an account, attackers monitor communications to understand business relationships, payment schedules, and internal hierarchies.T1534 - Internal Spearphishing: The attacker uses the compromised account to send fraudulent payment requests to employees in the finance department, appearing as a legitimate internal communication.T1499.004 - Masquerade as Other Person: Alternatively, attackers create look-alike domains (e.g., acme-corp.com vs. acme.com) to impersonate a CEO or vendor and send fraudulent invoices.This operation represents a major victory for international law enforcement. The arrest of 574 individuals is a significant disruption that will dismantle the operational capabilities of several criminal syndicates. The seizure of $3 million removes illicit profits and hinders the groups' ability to fund future activities. For businesses worldwide, this action may lead to a temporary reduction in BEC and other fraud attempts originating from the region. It also sends a strong deterrent message that cybercriminals operating in these areas are not beyond the reach of the law. The success of the operation underscores the critical importance of cross-border collaboration between law enforcement agencies to tackle transnational cybercrime.
D3-MFA - Multi-factor Authentication on all email accounts to prevent the initial account takeover that often precedes a BEC attack. Use D3-MENCR - Message Encryption and digital signatures to verify the authenticity of internal communications.The primary defense against BEC is training employees to recognize and verify suspicious financial requests.
Prevent the initial email account compromise that enables many BEC attacks.
Properly configure email server security settings (DMARC, SPF, DKIM) to prevent domain spoofing.
To defend against the initial stages of a Business Email Compromise (BEC) attack, organizations must enforce MFA on all email accounts. Many BEC campaigns begin with the takeover of a legitimate employee's email account, which is then used to monitor communications or send fraudulent requests. By requiring a second factor for login, MFA prevents attackers from gaining access even if they have stolen an employee's password via phishing or other means. This single control is one of the most effective ways to disrupt the BEC attack chain.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats