DEV Community

Thomas Cano Morant
Thomas Cano Morant

Posted on

Shocking Arrest in Paris: Woman Detained for Strange Behavior Reveals a Dangerous SMS Fraud Network

"Discovery of an IMSI-catcher Exposes a Massive Scam Operation and Highlights Challenges posed by New Technologies"

Paris, December 30, 2022

What initially seemed like an ordinary situation took a disturbing turn when police apprehended a woman in Paris due to her peculiar behavior. What unfolded next piqued the curiosity of law enforcement officials.

Arrest Unveils a Sophisticated Criminal Network

Upon her arrest, police officers decided to search the vehicle for any evidence that could explain the driver's unusual conduct. However, what they discovered was far more intriguing than expected.

The Alarming Discovery of an IMSI-catcher

In the back of the car, they found a device equipped with antennas connected to a cable concealed beneath the rear seat. Intrigued, they opened the trunk and were astounded to find a sealed container.

twitter showing picture of the device

Gripped by fear, the officers immediately suspected a bomb. Bomb disposal units were called in, and the suitcase was neutralized. After investigation, it was revealed that the case did not contain explosives. So, what was it?

Journal article related to the fake bomb alert

The Illegal and Dangerous Nature of the IMSI-catcher

The device found in the trunk proved potentially more dangerous than a bomb, and much costlier. Possession of such a device is strictly illegal for individuals and is often used by intelligence services during protests or significant events to intercept unencrypted metadata.

Unveiling the Troubling Details of the IMSI-catcher

The IMSI-catcher is a complex electronic device capable of conducting a "man-in-the-middle" attack on a GSM network. In other words, it emulates a 2G, 3G, 4G, or 5G antenna to attract nearby phones and extract data from these smartphones (calls, SMS, data).

The Consequences of IMSI-catcher Use

schema explaining the IMSI-catcher

This device can intercept the 2G signal, which does not require authentication to connect, thus allowing the interception of SMS and calls from the "network" and transmitting them to actual relay antennas. This process is completely transparent to the victim.

Unveiling a Massive SMS Fraud Operation

In this case, the owners of the IMSI-catcher were identified as two men owning a digital marketing company. They also provided low-cost SMS communication services, including the rental of a database containing 20 million mobile phone numbers.

Arrests and the Unveiling of a Massive Fraud Operation

A subsequent raid led to the discovery of a second vehicle, 12 phones, 8 computers, a few diamonds, and the identification of 3 other suspects. The alleged scammers utilized the device to send thousands of fraudulent messages, with 16,000 devices connected to the device and 424,000 fraudulent SMS sent.

The Impact of SMS Fraud

The fraudulent messages contained a link to a fake health insurance website, enabling the scammers to collect victims' personal and banking information. Authorities arrested two men suspected of being the masterminds behind the operation, along with a technician and another female driver involved.

Challenges Posed by New Technologies

This case highlights the challenges faced by law enforcement with the evolving nature of new technologies and the increasing use of artificial intelligence. Law enforcement's lack of knowledge in these areas facilitates the creation of fake content and the perpetration of fraudulent acts.

User of telegram bragging about using chatGPT to make scam-sites

  • User of telegram bragging about using chatGPT to make scam-sites

An Online Criminal Community

On the internet, criminal networks are suspicious of each other, leading to a widespread climate of mistrust. To address this issue, "scamlists" have been created where individuals share the names of alleged scammers. However, these accusations are often based on one person's word against another's, making it difficult to verify their accuracy.

this picture shows a example of files used to make a scam site using a French postal service.

  • this picture shows a example of files used to make a scam site using a French postal service.

in the code in one of those files, we can see a strange execution block of crypted code. when decrypted, the code make a request to another crypted place.

  • in the code in one of those files, we can see a strange execution block of crypted code. when decrypted, the code make a request to another crypted place.

when decrypted, we can see a redirection where the "altruist coder", get all the "work" from the newbie scammer

  • when decrypted, we can see a redirection where the "altruist coder", get all the "work" from the newbie scammer.

The Need for Coordinated Action

It is imperative to strengthen collaboration between authorities, businesses, and security experts to combat online crimes. Raising public awareness of the risks and implementing preventive measures are also essential to protect users of new technologies.

In conclusion, this arrest highlights the dangers posed by illegal devices such as the IMSI-catcher and emphasizes the importance of strict regulations to safeguard public security. Combating online fraud requires a multidimensional approach involving technology, legislation, and public awareness.

Sources:
Amaury Bucco Twitter.

Micode Yt Channel.

Underscore Yt Channel.
Journal article from Les Numériques

La croix for the schema

Top comments (0)