An international operation coordinated by Europol for a year, named "Project Compass," has partly led to the dismantling of a clandestine network of cybercriminals known as "The Com." The action, which combined law enforcement investigations from 28 countries, ended with 30 arrests and the link of 179 suspects to the group, while the investigators identified 62 victims and were able to directly protect four of them, according to the official communiqué published by Europol. Europol - Project Compass
What makes The Com particularly disturbing is not only its transnational character, but its diffuse structure and strategy: it is a decentralized network that operates in digital spaces frequented by minors - social networks, video games environments, messaging applications and streaming music platforms - and that combines from harassment and sexual extortion to incitement to violence and larger cyber attacks. Europol defines this collective as a kind of "nihilist niche" where young people are recruited and pressured to commit or facilitate crimes, including the production of child sexual exploitation material (CSAM). More details in the Europol communiqué.

Within The Com there are several subgroups that act for different purposes: some promote vandalic acts and physical violence, others focus on cyberattacks and ransomware, and a third group, often described as (S) extortion Com, is dedicated to blackmailing children with intimate content to force criminal or autolessive behaviour. A split reported since 2021, identified by the number "764," has been repeatedly associated with grooming and coercion to obtain explicit material from minors that is then used as a currency within the network. Two alleged leaders of this segment were arrested and charged in April 2025 for their role in an international plot of child exploitation, according to the United States Department of Justice. Department of Justice - arrests of 764 leaders
The fact that criminal actors connect activities that we usually think of as separate - sextorsion, CSAM production, ransomware and physical damage - makes the threat more difficult to combat. These networks take advantage of the anonymity of modern communication tools, the fragmentation of responsibilities between platforms and the cross-border nature of the web. Europol has stressed that only through sustained cooperation between countries can the gaps that these groups exploit and act quickly to protect vulnerable children be closed.
Project Compass shows how early coordination can make a difference: the operation focused not only on arrests, but on identifying victims, preserving evidence and cutting recruitment channels. International intervention also made it possible to link The Com to more notorious incidents, including ransomware attacks on companies and gaps in casinos, which shows that its activity is not limited to youth harassment but can scale up to corporate cybercrime.
What lessons does this case leave? First, that digital spaces where minors feel comfortable are not immune to risk. Secondly, that criminal organizations are adaptive: they mix traditional extortion techniques with technological tools to amplify their scope. And third, that effective detection requires both the action of the police and the responsibility of platforms, families and educators.
From the preventive and operational point of view there are several important fronts. Platforms should improve proactive moderation and reporting tools, without turning detection into an excuse to violate privacy. National legislation and international agreements should be updated to facilitate cross-border investigations and secure intelligence exchange. And at the social level, it is essential that adults monitor risk signals, have open discussions with young people about the safe use of the Internet and know where to report: in the United States, for example, there is a CyberTipline of the NCMEC and in the United Kingdom, organisations such as the Internet Watch Foundation working on the detection and withdrawal of CSAM.
For families, the recommendation is not to monitor with absolute distrust, but to accompany. Explain the risks, know the applications that children use, teach them how to set up privacy options and encourage them to talk if anything makes them uncomfortable are practical steps that reduce exposure. Keeping catches and records - and not intervening in a way that would endanger the investigation - is crucial if abuse is detected, and it is always appropriate to contact the competent authorities or specialized organisations before trying to mediate.

Technology can be both a vector of damage and a protection tool. Automated detection tools, forensic analysis and inter-agency collaboration have been decisive in Project Compass. However, the same ability to encrypted communications or use decentralized networks may hinder police action. The response must therefore be multidimensional: to combine technical capacities, updated legal frameworks and educational prevention programmes.
The blow to The Com is a painful reminder that the threat against minors online is real and rapidly evolving. Operations such as Project Compass offer a model of cooperation, but they also show that work does not end with arrests: reconstruction, victim protection and sustained prevention require investment, coherent policies and a society that understands how to protect its children in an increasingly digitized environment.
If you want to consult the original source on the operation and institutional statements, you can read the material published by Europol on its official website Here. and the Department of Justice & apos; s communiqué on arrests related to group 764 Here.. For resources and how to report in the US the CyberTipline of the NCMEC is available Here. and the Internet Watch Foundation offers information and support from the United Kingdom Here..
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...