---
title: "Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking | DMARC Report"
description: "Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking from DMARC Report explains practical steps for email authentication, domain."
image: "https://dmarcreport.com/og/blog/cybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking.png"
canonical: "https://dmarcreport.com/blog/cybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking/"
---

Quick Answer

\_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report Cybercrime Network Dismantled, CBI InvestigatesCyberfraud , CISA Stops Hacking

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Fcybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Cybercrime%20Network%20Dismantled%2C%20CBI%20Investigates%20Cyberfraud%2C%20CISA%20Stops%20Hacking&url=undefined%2Fblog%2Fcybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Fcybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Fcybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking%2F&title=Cybercrime%20Network%20Dismantled%2C%20CBI%20Investigates%20Cyberfraud%2C%20CISA%20Stops%20Hacking "Share on Reddit") [ ](mailto:?subject=Cybercrime%20Network%20Dismantled%2C%20CBI%20Investigates%20Cyberfraud%2C%20CISA%20Stops%20Hacking&body=Check out this article: undefined%2Fblog%2Fcybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking%2F "Share via Email") 

![Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![Dmarc alignment 7894 150x150](https://media.mailhop.org/dmarcreport/images/2024/12/dmarc-alignment-7894-150x150.jpg) 

> From a product strategy perspective, DMARC reporting is evolving from a security tool to a business intelligence platform, says Brad Slavin, General Manager of DuoCircle. The data in aggregate reports tells you not just who’s spoofing you, but who’s sending legitimate email on your behalf - and whether they’re doing it correctly.

\_According to the [FBI’s 2022 Internet Crime Report (IC3)](https://www.ic3.gov/Media/PDF/AnnualReport/2022IC3Report.pdf), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. DMARC Report

Cybercrime Network Dismantled, CBI InvestigatesCyberfraud , CISA Stops Hacking

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-18873">
						<source src="https://media.mailhop.org/dmarcreport/images/2024/12/Cybercrime-Network-Dismantled-CBI-InvestigatesCyberfraud-CISA-Stops-Hacking.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M26S">2:26</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-18873" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-18873" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-18873" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-18873" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/cybercrime-network-dismantled-cbi-investigatescyberfraud-cisa-stops-hacking/&t=Cybercrime Network Dismantled, CBI InvestigatesCyberfraud , CISA Stops Hacking" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/cybercrime-network-dismantled-cbi-investigatescyberfraud-cisa-stops-hacking/&url=Cybercrime Network Dismantled, CBI InvestigatesCyberfraud , CISA Stops Hacking" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2024/12/Cybercrime-Network-Dismantled-CBI-InvestigatesCyberfraud-CISA-Stops-Hacking.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/cybercrime-network-dismantled-cbi-investigatescyberfraud-cisa-stops-hacking/" class="input-link input-link-18873" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-18873" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-18873” readonly/>

```
					<button class="copy-embed copy-embed-18873" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

This week has been no less of a rollercoaster ride when it comes to the cybersecurity world. From busting the biggest-ever German cybercrime marketplace to conducting a thorough investigation to nab threat actors and sharing advisories and hacks to prevent hacks and [cyberattacks](https://www.thesun.co.uk/tech/31014035/bust-biggest-dark-web-marketplace-cyber-attacks/), it has been the week when \*\*cyber authorities and experts are finally taking control.

No matter which corner of the world you are sitting in right now, know that [cybersecurity](https://dmarcreport.com/blog/how-to-educate-or-train-employees-on-cybersecurity/) should be one of your **topmost priorities**. Let’s find out together about the latest cyber happenings around the globe.

Here you go!

## Cybercrimenetwork busted by German police!

The German law enforcement team has finally managed to nab the largest ever online cybercrime marketplace in Germany called [Cybercrime Network](https://www.nextgov.com/cybersecurity/2024/05/us-disables-global-cybercrime-network-enabled-theft-billions-fraud-schemes/396957/). _The administrator has been arrested and is being charged with multiple allegations, such as data stealing, narcotics business, and other illegal services_. The \*\*29-year-old admin goes by the name of Techmin. Techmin has been a part of Cybercrime Network for many years.

Established 12 years ago, Cyberrimenetwork was the favorite place among German threat actors to publish [stolen data](https://www.abc.net.au/news/2024-12-05/united-states-allege-china-behind-salt-typhoon-telecoms-hack/104687712). The platform was also available for other [illegitimate activities](https://www.nbcnews.com/business/taxes/dont-forget-declare-income-stolen-goods-illegal-activities-irs-says-rcna10345) such as **narcotics sale and purchase**, document forging, etc.

To everyone’s surprise, the site had a whopping 100,000 users and over 100 registered sellers at the time of the shutdown. Users/buyers used to make payments for products or services on Cybercrimenetwork through Cryptocurrency **Monero and Bitcoin**. In the past 6 years, transactions worth [1000 bitcoins and 20,000 Monero](https://www.bleepingcomputer.com/news/security/police-seizes-largest-german-online-crime-marketplace-arrests-admin/) have taken place on Cybercrimenetwork. Apart from this, the platform charged 5% transaction fees and also earned through a monthly subscription fee from advertising revenue and sellers .

Authorities dug deeper and took down the servers that were an integral part of Cybercrimenetwork’s core **technical infrastructure**.

## CBI launches a massive cyber fraud investigation across Delhi, India

CBI, or the **Central Bureau of Investigation**, has launched a massive investigation into transactional cyber fraud cases worth [USD 14 million in Delhi, the capital of India](https://www.livemint.com/news/india/cyber-crime-case-cbi-conducts-searches-in-delhi-ncr-in-connection-with-rs-117-crore-fraud-11733310917246.html). The investigation was sparked by a complaint by the Union Home Ministry’s Cyber Crime Coordination Centre, which focused on unknown organized [cyber criminals](https://edition.cnn.com/2024/06/10/tech/hospital-cyberattack-google-microsoft/index.html) and international threat actors who have been conducting financial fraud across India.

A CBI spokesperson has revealed that the threat actors from overseas have been using **Telegram, WhatsApp**, and multiple websites to carry out [malicious activities](https://www.msspalert.com/news/mssp-market-news-malicious-activity-spikes-after-crowdstrike-outage). These apps are frequently used to execute task-based frauds, job scams, [lottery scams](https://www.occrp.org/en/news/us-convicts-woman-involved-in-jamaican-lottery-scam), high returns on minimal investments, easy loans, and so on.

_During the investigation, the CBI seized ‘incriminating’ evidence, such as financial records and electronic devices, from 10 locations across Delhi_.

![Dmarc report](https://media.mailhop.org/dmarcreport/images/2024/12/dmarc-report-1.jpg) 

CBI conducted a similar operation in **September across India**. They focused on cities like Vishakapatnam, Pune, Hyderabad, and Ahmedabad. _They nabbed around 26 suspects and seized 951 items, including mobile phones, electronic devices, financial information, laptops, luxury vehicles, locker keys, and cash_.

## CISA shares actionable tips to prevent hacking attempts!

The US government is doubling down on its efforts to slow down and eventually fizzle out [malicious attempts](https://www.gmanetwork.com/news/topstories/nation/914211/dnd-fake-video-of-marcos-a-maliciously-crude-destab-attempt/story/) by threat actors. Today, CISA ([Cybersecurity and Infrastructure Security Agency](https://securityintelligence.com/news/cisa-hackers-key-systems-offline/)) has shared tips and hacks with **network defenders**. This step was taken after the FBI and CISA acknowledged [data breach](https://www.scworld.com/brief/us-data-breach-victimization-spikes) attacks against major broadband providers such as Lumen Technologies, AT&T, Verizon, and T-Mobile.

During this attack, the [threat actors](https://thehackernews.com/2024/10/cisa-warns-of-threat-actors-exploiting.html) managed to gain access to the ‘**private communications**’ of a few government officials and customer call records. They did not stop there; they further broke into the US government’s wiretapping platform.

Authorities still have no clarity about the time when the hackers managed to lurk in the networks of these **telecom giants**. _It is suspected that these hackers have been there for months or longer, and that’s exactly how they managed to wipe out massive amounts of data_.

The fail-proof[ guide](https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure) has been launched as a joint collaboration between the NSA, FBI, and international partners .\_ The ultimate goal is to minimize the impact of the attack and help people gain better insights into data flow, user activities, and network traffic\_.

The perpetrators have not yet been completely eradicated. Investigation is going on to find out the \*\*scope and impact of the attack. Also, preventive measures have been rolled out so that no such [hacking attacks](https://www.bbc.com/news/world-asia-68163172) take place in the future.

The key concept behind this **advisory is vigilance**.

Some of the major tips that CISA shared are:

Regular patching and upgradation of devices

- [Strong cryptography](https://en.wikipedia.org/wiki/Strong%5Fcryptography)
- Disabling unencrypted and unauthenticated protocols
- Secure and cautious password storage
- Configuration of systems
- **Monitor traffic**, even if it is coming from trusted partners
![Dmarc check 5719](https://media.mailhop.org/dmarcreport/images/2024/12/dmarc-check-5719-1.jpg) 

As cybersecurity continues to advance, adopting essential [email security](https://dmarcreport.com/blog/why-email-security-matters-and-how-to-get-it-right/) measures such as [SPF](https://dmarcreport.com/what-is-spf/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [DMARC](https://dmarcreport.com/) is crucial to prevent fraud, phishing, and [unauthorized access](https://www.securitymagazine.com/articles/86650-common-types-of-unauthorized-access-and-how-to-combat-them), \*\*safeguarding sensitive information from evolving threats.

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ email security ](/tags/email-security/)[ News ](/tags/news/)[ SPF ](/tags/spf/) 

![Vasile Diaconu](https://media.mailhop.org/dmarcreport/images/team/vasile-diaconu.jpg) 

[ Vasile Diaconu ](/authors/vasile-diaconu/) 

Operations Lead

Operations Lead at DuoCircle. Runs project management, developer coordination, and technical support execution for DMARC Report.

[LinkedIn Profile →](https://www.linkedin.com/in/vasile-diaconu/) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 4m  Akira flaunts victims, Idaho targets orthodontist, AI granny protects  Nov 22, 2024 ](/blog/akira-flaunts-victims-idaho-targets-orthodontist-ai-granny-protects/)[  Foundational 4m  Ambient Light Spying, Cybersecurity Prices Drop, Euro 2024 Threats  Jul 10, 2024 ](/blog/ambient-light-spying-cybersecurity-prices-drop-euro-2024-threats/)[  Foundational 4m  Banks Drop OTPs, Major Cyber Heist, Spying Spouses Arrested  Jul 18, 2024 ](/blog/banks-drop-otps-major-cyber-heist-spying-spouses-arrested/)[  Foundational 4m  Car Cameras Hackable, UK Water Breach, Thailand Frees Captives  Feb 28, 2025 ](/blog/car-cameras-hackable-uk-water-breach-thailand-frees-captives/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking","description":"Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking from DMARC Report explains practical steps for email authentication, domain.","url":"https://dmarcreport.com/blog/cybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking/","datePublished":"2024-12-06T07:41:10.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2024-12-06T07:41:10.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/vasile-diaconu/#person","name":"Vasile Diaconu","url":"https://dmarcreport.com/authors/vasile-diaconu/","jobTitle":"Operations Lead","description":"Vasile Diaconu is the Operations Lead at DuoCircle, the company behind DMARC Report and AutoSPF. He coordinates between engineering, product, and technical support - running project management, interfacing with developers on customer-reported issues, and making sure work that comes in through the support channel actually gets closed out. Vasile sits at the intersection of customer feedback and engineering execution, giving him a direct view of which email authentication problems customers hit most often in production.","image":"https://media.mailhop.org/dmarcreport/images/team/vasile-diaconu.jpg","knowsAbout":["SaaS Operations","Technical Support Coordination","Customer Issue Resolution","Engineering Program Management","Deployment Operations"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/vasile-diaconu/"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/cybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking/"},"articleSection":"foundational","keywords":"dkim, DMARC, email security, News, SPF","wordCount":1082,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"Cybercrime Network Dismantled, CBI Investigates Cyberfraud, CISA Stops Hacking","item":"https://dmarcreport.com/blog/cybercrime-network-dismantled-cbi-investigates-cyberfraud-cisa-stops-hacking/"}]}
```
