- The Guardia Civil arrested two suspects involved in an extensive online fraud scheme targeting users in Valencia and other Spanish provinces.
- The criminals cloned a popular telecom operator’s website to steal banking details and create virtual cards for unauthorized purchases.
- Authorities found a ”command center” with 65 mobile phones, 87 SIM cards, cryptocurrency wallets, and prepaid cards worth €12,000.
- The total financial damage is estimated at around €20,000, with at least 30 victims identified.
- One suspect is in preventive custody, while the other remains free with charges; investigations are still ongoing.
Guardia Civil Cracks Down on Digital Scam Network Affecting Valencia
The Guardia Civil has successfully dismantled a refined digital fraud operation that impacted users in Valencia and other Spanish provinces. A 44-year-old man and a 31-year-old woman were arrested in connection with a scam involving the cloning of a leading telecom operator’s website. The perpetrators deceived victims into handing over sensitive banking data, which they then used to generate virtual payment cards for illegal purchases across various businesses.
How the Fraud Scheme Worked
The fraudsters created a fake website nearly identical to that of a multinational telecommunications company. Victims who thought they were legitimately recharging their phone credit ended up submitting their bank details to the criminals instead. These data were then exploited to generate virtual cards, linked to numerous mobile devices, allowing unauthorized shopping transactions.
- Purchases included clothing, groceries, cryptocurrency vouchers, and prepaid cards.
- The scam’s structure made it arduous to trace, given it’s international scope, including virtual cards issued from European countries such as Cyprus, France, Greece, Lithuania, and Poland.
Investigation and Seizure Details
The operation, dubbed Júpiter-44, began after a victim reported the scam. Subsequent investigation identified at least 30 affected individuals across multiple provinces, including Valencia.
| Item Seized | Quantity |
|---|---|
| Mobile Phones | 65 |
| SIM Cards | 87 |
| Laptops | Several |
| Cryptocurrency Wallets | 9 |
| Prepaid Cards value | €12,000 |
At the suspects’ residence in Torrevieja, the Guardia civil discovered what they described as a “central command center” for the operation. Along with the mobile devices and prepaid cards, they seized laptops and cryptocurrency wallets. The financial damage to victims is estimated to be roughly €20,000.
Current Legal Status and Ongoing Investigation
The Torrevieja Court ordered the preventive imprisonment of the male suspect, while the female suspect was released on charges pending further investigation.Authorities have not ruled out the emergence of additional victims as the case develops.
Precautions Against Online Fraud
The Guardia Civil stresses the importance of verifying the authenticity of websites before entering personal or financial data online. Fraud schemes of this nature have become increasingly common and are frequently enough difficult to detect given their complex and international modus operandi.
- Always check for secure website indicators (HTTPS, official URLs).
- Avoid clicking on suspicious links, especially those received via email or SMS.
- Regularly monitor banking and card activity for unauthorized transactions.
- Use official apps or verified portals for telecom services and payments.
Impact Beyond Valencia
The operation revealed the use of financial instruments issued in several European countries, indicating a wide-reaching network that exploited cross-border vulnerabilities. Besides Valencia, victims were identified in other spanish provinces, showcasing the scale and sophistication of this cybercrime.
final thoughts
This case highlights the evolving tactics of online fraudsters and the critical role of law enforcement collaboration in addressing digital scams. Victims should remain vigilant and proactive to safeguard their personal and financial information in an increasingly connected world.
Sources:

