The group is believed to have stolen an estimated $11 million — potentially as much as $30 million — in more than 30 attacks across 15 countries in Africa, Asia, and Latin America. Credit: Thinkstock A suspected senior member of the hacker group OPERA1ER has been arrested in Operation Nervone, conducted jointly by multiple international law enforcement agencies, Interpol said in a press note. "Following extensive cooperation, Interpol, Afripol, Group-IB, and C?te d'Ivoire's Direction de l’Information et des Traces Technologiques (DITT) are announcing the arrest of a suspected senior member of the group, dealing a significant blow to their criminal activities," Interpol said. OPERA1ER -- also known as NX$M$, DESKTOP Group, and Common Raven -- has been operational for over four years. It is a highly organized criminal organization that has targeted financial institutions and mobile banking services with malware, phishing campaigns, and large-scale business email compromise (BEC) scams. "The group is believed to have stolen an estimated $11 million -- potentially as much as $30 million -- in more than 30 attacks across 15 countries in Africa, Asia, and Latin America," Interpol said. Operation Nervone Operation Nervone was backed by two key Interpol initiatives -- the African Joint Operation against Cybercrime, and the Interpol Support Programme for the African Union, which works with the AU’s Afripol intergovernment police coordination agency. The initiatives are funded by the UK’s Foreign, Commonwealth & Development Office and Germany's Federal Foreign Office, respectively. "In early June, authorities in C?te d'Ivoire were able to arrest a key suspect linked to attacks against financial institutions across Africa," Interpol said in its release. Researchers at Group-IB first identified the group's illicit email campaigns in 2018, when they recognized spear phishing operations responsible for spreading malware such as remote access tools. Additional information that helped with the investigation was shared by the Criminal Investigative Division of the US Secret Service and researchers from DarkLabs, a Booz Allen Hamilton cybersecurity team. The hacker group OPERA1ER OPERA1ER is a French-speaking, financially motivated hacker group, according to Group-IB. The cybersecurity firm was able to identify at least 30 attacks carried out by OPERA1ER between 2019 and 2021. The group successfully compromised payment and Internet banking systems in all these attacks. In at least two banks, OPERA1ER was able to access the SWIFT messaging interface, which is used to communicate the details of financial transactions. The group used spear phishing emails as their initial attack vector. The emails contained links to Google Drive, Discord servers, compromised legitimate websites, and malicious servers, which belong to the threat actor. Most of the emails were written in French, however, researchers also reported emails written in English. "Furthermore, this email targeted only 18 users in the same country all linked to financial services associated with the topic and some VIPs," Group-IB said in the report. The group used multiple payloads including NanoCore, H-Worm (Houdini Worm), WSH Rat, Remcos, Adwind, or QNodeJS between 2019 and 2020. "Once an initial RAT is deployed, operators analyze compromised machines. When a machine of interest is infected, Metasploit Meterpreter or Cobalt Strike Beacon is downloaded and launched," Group-IB said in the research, adding that the group typically waited for a year after the initial intrusion and the final payload execution. The group would finally withdraw the stolen money as cash through an extensive network of ATMs over holidays or weekends to avoid detection. There were also links found between OPERA1ER and a cybercriminal group, Bluebottle, that used a signed Windows driver in attacks against at least three banks in French-speaking African countries, according to Symantec. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe