Cops drill into chat apps, sink plot to smuggle tonnes of coke into Europe

Big blow to blighters' blow-by-the-boatload blueprint

Video Efforts by cops to seize and shut down encrypted messaging apps favored by criminals, and then mine their conversations for evidence, appear to have led to more arrests — plus the seizure of about 2.7 tonnes of cocaine.

Europol on Friday celebrated its "dismantling of a large drug-trafficking organization," following an investigation into a Balkan cartel that was suspected of smuggling coke into Europe from South America via sea. That Serbian-led police effort included help from Brazil, Croatia, France, Poland, Portugal, Spain, and Slovenia.

Specifically, the plod said the cartel, which had been under investigation since January 2022, was slinging "multi-ton cocaine shipments" from Brazil to the EU using a large boat. We're told the vessel's skippers had also gone to West Africa to prep their craft for smuggling. Below is a video summary of the raids carried out against the crime ring.

"Operational intelligence pointed out that the skippers of Ukrainian and Czech nationality traveled several times to Cabo Verde or other locations in West Africa to prepare their vessel for smuggling operations," the European cops claimed.

"Recently uncovered operational information revealed that the vessel was located in Brazil."

This operational info, we're told, allowed Brazilian and Spanish cops to monitor the ship, and an "action day" on August 24 led to 15 house searches, six arrests, and the seizure of 2.7 tonnes of charlie along with two high-end cars, luxury watches, and around €550,000 ($593,000) in cash.

International authorities also froze a "large number" of bank accounts and ongoing real estate transactions as the financial investigation continues.

One of the people arrested, a Serbian national, is described as "one of the main organizers" of the cartel. Police said they monitored this suspect's involvement in the boatloads of blow — along with the Serbian's alleged cohorts — via encrypted messaging platforms.

From chat apps to arrests

Europol doesn't specify which chat app or multiple apps they snooped around on to find the alleged Serbian drug lord. The cops do note, however, that "the takedown of three encrypted communication tools used by criminals, namely EncroChat, Sky ECC and ANOM, has given international law enforcement an unprecedented insight into criminal networks and how they function."

All three of these subscription-based, encrypted messaging services were also infiltrated and shut down by police over the past few years. Criminals used these secure communication apps to plan operations and hide them from the prying eyes of law enforcement.

Data gleaned from all of these services has since been used as evidence to arrest thousands.

These comms platforms also highlighted "the important role of criminal networks largely composed of nationals of countries in the Balkan region play in the global cocaine trade," according to Europol. The snappily named Operational Taskforce Balkan Cartel, the label under which the raids took place, was created in response to this threat, we're told. 

This is at least the second such cartel takedown since May that European police have credited to an encrypted messaging app hack.

On May 11, police arrested three people in Belgrade described as "the biggest" drug lords in the Balkans, as well as 10 other suspects in Serbia, and 10 alleged members of the cartel in Belgium, Serbia, Peru, and the Netherlands, bringing the total arrests to 23. 

Law enforcement credited last year's Sky ECC takedown with those arrests. ®

Send us news

Uncle Sam probes cyberattack on Pennsylvania water system by suspected Iranian crew

CISA calls for stronger IT defenses as Texas district also hit by ransomware crew

MOVEit victim count latest: 2.6K+ orgs hit, 77M+ people's data stolen

Real-life impact of buggy software laid bare – plus: Avast tries to profit from being caught up in attacks

Rights warriors claim online ad auction data a danger to national security

'The industry can not be allowed to put elected leaders, military personnel at risk'

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Mirai malware infects routers and cameras for new botnet

Akamai sounds the alarm – won't name the manufacturers yet

Rogue ex-Motorola techie admits cyberattack on former employer, passport fraud

Pro tip: Don't use your new work email to phish your old firm

'Serial cybercriminal and scammer' jailed for 8 years, told to pay back $1.2M

Crook did everything from SIM swaps to fake verified badge scams

Top Ukrainian cyber officials fired after allegedly pocketing kickbacks from govt IT deals

Duo probed over alleged $2M embezzlement plot

Clorox CISO flushes self after multimillion-dollar cyberattack

Plus: Ransomware crooks file SEC complaint against victim

Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media

Also: NXP China attack, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month

Bug hunters on your marks: TETRA radio encryption algorithms to enter public domain

Emergency comms standard had five nasty flaws but will be opened to academic research

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets