Operation Ramz: phishing as a service and the new border of international cooperation against cybercrime

Published 4 min de lectura 30 reading

The regional operation known as Operation Ramz coordinated by INTERPOL in collaboration with private cybersecurity firms, it has left a hard X-ray of computer crime in the Middle East and North Africa: more than 200 arrests, 382 suspects identified in 13 countries, 53 seized servers and at least 3,867 confirmed victims from almost 8,000 intelligence packages recovered from the teams involved. These numbers not only describe a police action, but also reveal the scale and professionalization of a criminal ecosystem that provides services - such as the physical - as- service - and that exploits both technical failures and human vulnerabilities.

The geographical and operational scope of the action shows a double reality: on the one hand, the increasing capacity of law enforcement to operate in network and synkholding of malicious infrastructure; on the other, the critical dependence of that work on private sector cooperation and technical NGOs, which provide intelligence on indicators of commitment, malicious traffic and correlations that local judicial systems could not identify on their own. INTERPOL mentions collaboration with companies such as Kaspersky and Group-IB, as well as technical organizations such as The Shadowserver Foundation and Team Cymru, which stresses that the effective fight against these threats is hybrid and multilevel ( INTERPOL communiqué).

Operation Ramz: phishing as a service and the new border of international cooperation against cybercrime
Image generated with IA.

Among the most worrying findings are the use of forced workers in fraudulent investment schemes and the exploitation of committed end-user devices to distribute malware without their owners knowing. This pattern confirms that cybercrime is not only a technical problem: it is also a social and economic problem that aggravates labour, migration and financial vulnerabilities.

From a technical perspective, the seizure of 53 servers means that many operations still depend on centralized infrastructure that can be identified and neutralized if there is effective cooperation. However, the emergence of the phishing- as- a- service and the platforms that rent infrastructure ready to attack make the entry threshold for criminals ever lower and difficult to disincentive only with timely arrests. The solutions should therefore combine disruptive measures on infrastructure with sustained prevention and education efforts.

For companies and system managers the lesson is clear: Reactive defenses are not enough. It is essential to implement strong authentication policies, deploy e-mail controls (SPF, DKIM and DMARC), actively monitor outgoing traffic to detect unusual connections to command and control servers, and participate in intelligence exchange circuits that allow for synkholding and coordinated response. Groups like Kaspersky and Group-IB offer intelligence analysis and service that complement internal capabilities and accelerate the identification of malicious infrastructure ( Kaspersky, Group-IB).

End-users can also reduce their exposure with simple but effective measures: activate the authentication of two factors in financial services and e-mails, distrust of high-performance investment promises requested by non-verifiable channels, frequently review bank movements and not provide credentials to web or mobile interfaces without verifying the URL and certificate. In addition, in the face of any evidence of fraud, report it to local authorities and the service provider to cut off abuse chains and protect potential future victims.

Operation Ramz: phishing as a service and the new border of international cooperation against cybercrime
Image generated with IA.

At the public level, the repetition of international operations during the year - including previous actions such as Operation Synergia III and Operation Red Card 2.0 - shows that coordinated campaigns can produce sensitive results, but also that the threat is persistent and rapidly evolving. There is a need to invest in digital forensic training, more agile cross-border legal frameworks and remedies for victim protection, including care for those who are forced to participate in fraud. Without such comprehensive support, arrests will have a limited impact and criminal platforms will be rectified in new ways.

For journalists, risk makers and decision makers, the recommendation is not to consider these operations as final closures but as opportunities to strengthen resilience: to audit critical systems, to demand transparency on how suppliers manage detections and infrastructure failures, and to promote public digital literacy campaigns that reduce the success rate of phishing. Resources and practical guides on prevention and good technical practices are available from specialized security and incident response organizations, which provide up-to-date guides for companies and individuals.

Operation Ramz is a strong reminder that the fight against cybercrime requires combining intelligence, judicial response and education. International cooperation has demonstrated its operational value: it must now be translated into sustainable strategies that close not only servers and accounts, but also the opportunities that fuel these illicit networks.

Coverage

Related

More news on the same subject.