Interpol 'Operation Ramz' seizes 53 malware, phishing servers

Brajeshwar1 pts0 comments

INTERPOL ‘Operation Ramz’ seizes 53 malware, phishing servers

Home<br>News<br>Security<br>INTERPOL ‘Operation Ramz’ seizes 53 malware, phishing servers

INTERPOL &lsquo;Operation Ramz&rsquo; seizes 53 malware, phishing servers

By Bill Toulas

May 18, 2026

06:15 PM

More than 200 individuals were arrested for cybercrime activities during INTERPOL's Operation Ramz, which focused on the Middle East and North Africa.

Law enforcement also identified another 382 suspects across 13 countries (Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and the UAE).

In addition to the arrests, authorities seized 53 servers used for phishing, malware, and online fraud that affected at least 3,867 confirmed victims, as determined from nearly 8,000 intelligence packages retrieved from the equipment.

&ldquo;The operation focused on neutralizing phishing and malware threats, as well as tackling cyber scams that inflict severe cost to the region,&rdquo; reads the INTERPOL announcement.

Seized devices in Jordan<br>Source: INTERPOL

INTERPOL collaborated with several private cybersecurity firms to track the malicious infrastructure, including Kaspersky, Group-IB, The Shadowserver Foundation, Team Cymru, and TrendAI.

Some highlights of &lsquo;Operation Ramz&rsquo; include:

securing compromised devices unknowingly used to spread malware in Qatar

dismantling an investment scam operation in Jordan, where 15 trafficked workers from Asia were forced to run fraud schemes; two organizers were arrested

disabling a vulnerable malware-infected server containing sensitive data in Oman

shutting down a phishing-as-a-service platform in Algeria and arresting one suspect

seizing devices and banking data linked to phishing operations in Morocco, with multiple suspects under judicial investigation

This is the third major cybercrime crackdown operation INTERPOL has concluded this year.

In March, the authorities announced &lsquo;Operation Synergia III,&rsquo; which resulted in sinkholing 45,000 malicious IP addresses, the seizure of 212 devices and servers, and the arrest of 94 individuals across 72 countries, for participating in phishing, hacking, fraud, and malware distribution.

Earlier, in February, INTERPOL announced the arrest of 651 suspects across 16 African countries, as part of &lsquo;Operation Red Card 2.0,&rsquo; targeting investment fraud, mobile money scams, and fake loan apps linked to more than $45 million in losses.

The Validation Gap: Automated Pentesting Answers One Question. You Need Six.

Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.<br>This guide covers the 6 surfaces you actually need to validate.

Download Now

Related Articles:

Student hacked Taiwan high-speed rail to trigger emergency brakes<br>Operation PowerOFF identifies 75k DDoS users, takes down 53 domains<br>Russia arrests suspected owner of LeakBase cybercrime forum<br>Telegram channels expose rapid weaponization of SmarterMail flaws<br>US charges suspected Dream Market admin arrested in Germany

Arrest

Cybercrime

INTERPOL

Legal

Seizure

Bill Toulas

Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.

Previous Article

Next Article

Post a Comment Community Rules

You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Upcoming Webinar

Popular Stories

New Windows 'MiniPlasma' zero-day exploit gives SYSTEM access, PoC released

Microsoft rejects critical Azure vulnerability report, no CVE issued

Tycoon2FA hijacks Microsoft 365 accounts via device-code phishing

Sponsor Posts

Are stolen sessions bypassing your security? Find out for free.

https://www.nmftacyber.com/

Managing Shadow AI: 5 Steps to Secure Employee AI Use Without Killing Productivity

12 steps to defend against AI-powered exploits before the Glasswing report drops

Upcoming Webinar

Login

Username

Password

Remember Me

Sign in anonymously

Sign in with Twitter

Not a member yet? Register Now

Reporter

Help us understand the problem. What is going on with this comment?

Spam

Abusive or Harmful

Inappropriate content

Strong language

Other

Read our posting guidelinese to learn what content is prohibited.

Submitting...

SUBMIT

operation interpol malware phishing ramz servers

Related Articles