Subscribe to Our Newsletter

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks
Feature image
CBIA thanks MART PRODUCTION for the photo

Inside the €2M Cross-Border Vishing Operation That Targeted EU Citizens

CBIA Team profile image
by CBIA Team

When a Latvian pensioner picked up a call from what appeared to be the State Police, the voice on the other end knew her bank, her account, and exactly what to say to make her afraid — because the people on the other end of the line had done this hundreds of times before.

Latvian and Ukrainian law enforcement agencies have now announced the dismantling of an organized criminal network that used vishing — voice-based phishing where callers impersonate trusted authorities — to defraud citizens across the European Union. The joint operation has exposed the full machinery of a modern social engineering fraud, including call center operators in Ukraine, money mules across Latvia, and illicit cryptocurrency exchangers laundering the proceeds through Riga.

Background and Context

Vishing is a variant of phishing that exploits trust in authority figures — police officers or bank staff — rather than technical vulnerabilities. The Latvian State Police Cybercrime Unit, which consolidated 35 separate criminal cases involving fraud committed in 2023 and 2024, estimates the network defrauded residents of approximately €2 million. The attack surface in this case was entirely human, bypassing traditional cybersecurity defenses by manipulating victims into granting access to their own devices.

Key Figures and Entities

Investigators identified more than 170 money mules — people used to receive and move stolen funds — of whom 90 have been designated as suspects. According to the Cyber Police Department of the National Police of Ukraine, two Ukrainian nationals from Ivano-Frankivsk in their early 20s traveled to Latvia to recruit local individuals. These recruits opened bank accounts across European countries and transferred control of their cards to the criminal group for a small fee. Thirteen call center operators have been detained, including Latvian-speaking participants.

The operational playbook was precise and repeatable. Callers impersonated Latvian State Police officers and bank employees, informing victims that loans had been fraudulently taken out in their names. To "help expose the fraudsters," victims were instructed to install AnyDesk, a legitimate remote desktop access tool, granting operators full visual and interactive access to their devices. The stolen funds were then moved through "drop accounts" and converted into digital assets by unlicensed cryptocurrency exchangers in Riga. One such exchanger received a custodial sentence exceeding six years.

International Implications and Policy Response

The operation fits a well-documented regional pattern of cross-border crime. Europol’s liaison officers coordinated the information exchange, highlighting how recruitment networks span multiple EU states. The group’s leader was apprehended in Germany in 2024 and subsequently convicted in Estonia. Following cross-border coordination with Eurojust, two members who fled to Ukraine were detained in Ivano-Frankivsk on March 12, 2026. Assets subject to financial restraint in Latvia currently total €829,650.

Sources

This report draws on statements from the Latvian State Police, the Cyber Police Department of the National Police of Ukraine, and public records regarding enforcement actions by Europol and Eurojust.

CBIA Team profile image
by CBIA Team

Subscribe to New Posts

Lorem ultrices malesuada sapien amet pulvinar quis. Feugiat etiam ullamcorper pharetra vitae nibh enim vel.

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks

Read More