politics

Arrest of Three Dangerous Chinese Hackers in Tangier: Details of the Security Operation

Security forces in Tangier arrested three Chinese nationals on Saturday, February 1, for their involvement in cybercrime, specifically tampering with automated data processing systems and intercepting phone communications, according to a report published by Al-Akhbar on Tuesday, February 4.

A High-Tech Hacking Workshop in Rural Tangier

According to the same source, the suspects operated from an apartment equipped with advanced electronic devices, which they had converted into a hacking workshop in the rural area of Kznaya, on the outskirts of Tangier.

Seizures and Evidence Collected

Following thorough surveillance, authorities conducted a raid and caught the suspects in the act. The search operation led to the seizure of several items, including:

  • Laptops and desktop computers
  • A large number of SIM cards
  • Wireless electronic equipment
  • Other digital devices used in cyber fraud

How the Cybercriminals Operated

Preliminary investigations revealed that the suspects used advanced electronic techniques to reroute international phone calls onto local and national networks. This exploitation of tariff differentials enabled them to generate illicit profits.

Ongoing Investigation and Possible Accomplices

Under the supervision of the competent public prosecutor, an ongoing investigation is examining how these sophisticated devices were smuggled into Morocco and whether the suspects had accomplices inside or outside the country.

Previous Cybercrime Crackdowns in Morocco

Moroccan security services have previously dismantled similar cybercrime networks, including a recent case where authorities seized:

  • 5,485 used SIM cards
  • 337 new and preloaded SIM cards
  • 2,821 SIM holders
  • Various other digital devices

Growing Cyber Threats and Reinforced Security Measures

This operation comes amid the rising threats of cybercrime, highlighting the need to strengthen security measures to protect Morocco’s digital infrastructure from criminal activities targeting telecommunications and data systems.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button