FBI boasts of dark-web drug bust: 179 collared around the world, $6.5m in cash and 500kg of narcotics seized

Operation DisrupTor will 'significantly disrupt the online opioid trade'

A nine-month international operation spearheaded by the FBI has led to the arrest of 179 people across the world for selling drugs on the dark web.

Operation DisrupTor, announced on Tuesday, also resulted in the seizure of $6.5m (£5.1m) in cash and cryptocurrency as well as a 500kg haul of illegal drugs and 63 guns. Most of the gear seized were opioids like fentanyl, oxycodone and hydrocodone though the haul also included methamphetamine, heroin, cocaine, and ecstasy, the authorities said.

The operation follows two similar efforts in 2019, one dubbed SaboTor and the other focused on the so-called Wall Street Market, and targeted drug dealers who use dark-web networks, primarily Tor, to sell their wares. It's no coincidence that the stings were code-named DisrupTor and SaboTor by the Feds.


This is node joke. Tor battles to fend off swarm of Bitcoin-stealing evil exit relays making up about 25% of outgoing capacity at its height


Although the arrests and seizures are small compared to the overall size of the illegal online drug market, the message is clear: law enforcement has the tools, resources, and inclination to take on the difficult job of tracking down cyber-peddlers who try to mask their identities using Tor.

“Criminals selling fentanyl on the Darknet should pay attention to Operation DisrupTor,” said deputy attorney general Jeffrey Rosen. “The arrest of 179 of them in seven countries – with the seizure of their drug supplies and their money as well – shows that there will be no safe haven for drug dealing in cyberspace.”

Just as importantly, the operation again saw law enforcement across multiple departments and in multiple countries coordinate together, denying online drug sellers a long-held advantage. In the US alone, the investigation involved the FBI, DEA, Homeland Security, Secret Service, Postal Inspection Service, IRS, and the Bureau of Alcohol, Tobacco, and Firearms.

International reach

In addition to 121 people arrested in America, 42 were cuffed in Germany, eight in the Netherlands, four in the United Kingdom, three in Austria, two in Canada, and one in Sweden. It was overseen by the Joint Criminal Opioid and Darknet Enforcement team, known as JCODE.

The operation targeted a range of dark-web market sites, the FBI said, including AlphaBay, Dream, Wall Street, Nightmare, Empire, White House, DeepSea, and Dark Market. In each case, vendor accounts were tracked down, and the people behind them identified. The methods used in this case to snare the suspects in spite of Tor's anonymizing design are not yet known, and are usually kept a secret, though they may not involve any complex techniques or exploits of software vulnerabilities: they could be as simple as detecting and intercepting drugs in the mail. The FBI said it was still working on uncovering who were the people behind other accounts.

The US arrests occurred all over the country, in 14 states, and no less 23 cases/indictments have already been filed in court, pointing to a massive coordinated effort: six cases are in California; four in Pennsylvania; two in New Jersey; and the remainder in Colorado, Columbia, Connecticut, Florida, Georgia, Missouri, North Carolina, Ohio, Texas, Virginia, and Washington.

There were several stark details in the operation. In one case, a licensed pharmacist, Hyrum Wilson, 41, from Nebraska, has already pleaded guilty to planning to firebomb a competing pharmacy. Wilson illegally mailed prescription drugs to a William Burgamy in Maryland who then sold them over the dark web, according to the Feds. Together the two men planned to burn down the other pharmacy using Molotov cocktails enhanced with Styrofoam as a thickening agent, the g-men added.

The overall result of Operation DisrupTor, the FBI said, was that it “significantly disrupted the online opioid trade and sent a strong message that criminals operating on the Darknet are not beyond the reach of law enforcement.”


The FBI was sufficiently pleased with itself for its director Christopher Wray to hold a press conference and give a speech: “The law enforcement personnel assigned to JCODE specialize in threats where traditional criminal activity intersects with sophisticated technological platforms,” he noted. “Every day, they’re working to show these criminals that they can no longer count on hiding on the darknet - because we’re going to infiltrate their networks, shut down their online, illicit marketplaces, and bring them to justice, no matter what it takes.”

He went on: “Operation DisrupTor took place at a particularly critical time, as our country has seen a sharp rise in overdoses associated with potent narcotics during this pandemic. In just one case alone, the work of the JCODE task force led to the seizure of over 11 kilograms of suspected fentanyl associated with a dangerous drug trafficking organization operating in a small town in Ohio.” That single seizure is the equivalent of 5.5 million lethal doses, he explained.

He also recognized the importance of international cooperation with the likes of Europol: “The Darknet doesn’t reside within any single nation’s jurisdiction. So we all have to look beyond our borders and boundaries to tackle the problem of criminal enterprises using that platform to peddle their drugs.” ®

Similar topics

Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021