Summary

  • A couple in torrevieja arrested for ‌scamming ⁣nearly 20,000 euros from 30⁢ victims⁣ across 19 Spanish ⁣provinces.
  • They cloned the website of a‍ major telecommunications‍ operator to steal banking data during prepaid mobile card recharges.
  • Fraudsters created virtual cards linked to their phones to make⁢ purchases, including ⁣prepaid cards, crypto ‌coupons, food, ‌and clothing.
  • Operation Júpiter-44 led to the seizure of 65 mobile phones, 87 SIM cards, laptops, crypto wallets, and prepaid cards worth €12,000.
  • Victims resided across Spain and possibly ‍in Cyprus, France, Greece, Lithuania, and Poland.

telecom Website ‍Cloning Scam Strikes⁣ Across Spain: Couple Arrested

A Spanish couple has ‌been arrested after ⁢a ‌elegant online scam‌ defrauded ⁢almost 20,000 euros from around 30 people across ​19 provinces in Spain. The pair allegedly cloned the online recharge portal of a well-known ⁣telecommunications operator to steal their victims’ ‌banking credentials.

The Scam Operation: How It Worked

The couple, a 44-year-old man and a ‍31-year-old woman living near torrevieja, created a fake website that ⁣mimicked the genuine portal ​used by many customers to recharge⁣ prepaid mobile cards. When users entered their banking data,⁤ intending to top-up their mobile accounts, the fraudsters captured the credentials.

  • Data Theft: Bank details were intercepted during the‌ recharge process.
  • Virtual Cards Creation: Using digital wallet platforms, the scammers generated virtual ⁢cards linked to their ​own mobile ‍phones.
  • Fraudulent Purchases: These virtual cards were then used to buy‌ prepaid cards, cryptocurrency coupons, clothing, and ​groceries, primarily ⁣in​ the Vega Baja‍ del Segura region.

Wide Impact Across ‍Spain and Beyond

The victims are scattered across many ‌places in⁣ Spain, from Madrid and ⁢Valencia to Córdoba​ and Zaragoza, even reaching less populous⁣ provinces such as zamora and Huesca. The scope suggests a widespread and well-planned scam.

Additionally, the Guardia ⁣Civil noted the use of thirteen payment‌ cards issued by banks in Cyprus, France, Greece,​ Lithuania, and Poland. ⁤This international element raises concerns that victims outside Spain may⁤ also have fallen prey.

Operation Júpiter-44: The uncovering of a Fraud Hub

What began as a seemingly isolated complaint escalated into a full-scale investigation named “Júpiter-44.” Police surveillance uncovered the two suspects’ ⁣method of avoiding detection-the couple disguised themselves wearing caps and sunglasses and traveled in a foreign-registered vehicle⁤ not ​linked to them.

When agents raided their residence,they found a “central fraud operation” loaded with equipment:

Item Quantity Details
Mobile Phones 65 Latest generation devices used for virtual cards
SIM Cards 87 Used to⁢ operate multiple virtual cards and accounts
Laptops Several High-end for managing websites and digital wallets
Crypto Wallets 9 Used for transactions involving ⁤cryptocurrencies
Prepaid Bank Cards Various Anonymous‌ cards with €12,000 linked value

What This Means for Online Security

This case highlights how ‍fraudsters exploit trusted websites by cloning them to​ trick users into handing over sensitive financial data. It’s a reminder for all users to verify website URLs carefully and be cautious when⁣ entering bank details online.

Authorities urge users to only use ⁤official operator⁤ websites or apps and recommend enabling two-factor authentication ​where‌ possible to add an extra‍ layer of security.

Final Thoughts

As cyber scams grow in complexity, awareness is critical.‍ The operation shows how fraud can span multiple provinces and cross national borders, making vigilance essential in online ⁤financial transactions.

If you suspect fraudulent activity or have been targeted ⁣by similar scams,contact local law enforcement​ or your bank promptly.


Sources:

Share your love