Summary
- A couple in torrevieja arrested for scamming nearly 20,000 euros from 30 victims across 19 Spanish provinces.
- They cloned the website of a major telecommunications operator to steal banking data during prepaid mobile card recharges.
- Fraudsters created virtual cards linked to their phones to make purchases, including prepaid cards, crypto coupons, food, and clothing.
- Operation Júpiter-44 led to the seizure of 65 mobile phones, 87 SIM cards, laptops, crypto wallets, and prepaid cards worth €12,000.
- Victims resided across Spain and possibly in Cyprus, France, Greece, Lithuania, and Poland.
telecom Website Cloning Scam Strikes Across Spain: Couple Arrested
A Spanish couple has been arrested after a elegant online scam defrauded almost 20,000 euros from around 30 people across 19 provinces in Spain. The pair allegedly cloned the online recharge portal of a well-known telecommunications operator to steal their victims’ banking credentials.
The Scam Operation: How It Worked
The couple, a 44-year-old man and a 31-year-old woman living near torrevieja, created a fake website that mimicked the genuine portal used by many customers to recharge prepaid mobile cards. When users entered their banking data, intending to top-up their mobile accounts, the fraudsters captured the credentials.
- Data Theft: Bank details were intercepted during the recharge process.
- Virtual Cards Creation: Using digital wallet platforms, the scammers generated virtual cards linked to their own mobile phones.
- Fraudulent Purchases: These virtual cards were then used to buy prepaid cards, cryptocurrency coupons, clothing, and groceries, primarily in the Vega Baja del Segura region.
Wide Impact Across Spain and Beyond
The victims are scattered across many places in Spain, from Madrid and Valencia to Córdoba and Zaragoza, even reaching less populous provinces such as zamora and Huesca. The scope suggests a widespread and well-planned scam.
Additionally, the Guardia Civil noted the use of thirteen payment cards issued by banks in Cyprus, France, Greece, Lithuania, and Poland. This international element raises concerns that victims outside Spain may also have fallen prey.
Operation Júpiter-44: The uncovering of a Fraud Hub
What began as a seemingly isolated complaint escalated into a full-scale investigation named “Júpiter-44.” Police surveillance uncovered the two suspects’ method of avoiding detection-the couple disguised themselves wearing caps and sunglasses and traveled in a foreign-registered vehicle not linked to them.
When agents raided their residence,they found a “central fraud operation” loaded with equipment:
| Item | Quantity | Details |
|---|---|---|
| Mobile Phones | 65 | Latest generation devices used for virtual cards |
| SIM Cards | 87 | Used to operate multiple virtual cards and accounts |
| Laptops | Several | High-end for managing websites and digital wallets |
| Crypto Wallets | 9 | Used for transactions involving cryptocurrencies |
| Prepaid Bank Cards | Various | Anonymous cards with €12,000 linked value |
What This Means for Online Security
This case highlights how fraudsters exploit trusted websites by cloning them to trick users into handing over sensitive financial data. It’s a reminder for all users to verify website URLs carefully and be cautious when entering bank details online.
Authorities urge users to only use official operator websites or apps and recommend enabling two-factor authentication where possible to add an extra layer of security.
Final Thoughts
As cyber scams grow in complexity, awareness is critical. The operation shows how fraud can span multiple provinces and cross national borders, making vigilance essential in online financial transactions.
If you suspect fraudulent activity or have been targeted by similar scams,contact local law enforcement or your bank promptly.
Sources:

