www.infosecurity-magazine.com
Open in
urlscan Pro
54.230.21.10
Public Scan
Submitted URL: https://lnkd.in/gAPuekdX
Effective URL: https://www.infosecurity-magazine.com/news/police-shutter-13000-sites-piracy/
Submission: On December 02 via api from JP — Scanned from JP
Effective URL: https://www.infosecurity-magazine.com/news/police-shutter-13000-sites-piracy/
Submission: On December 02 via api from JP — Scanned from JP
Form analysis
2 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id2">
<table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr>
<td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url("https://www.google.com/cse/static/images/1x/en/branding.png") left center no-repeat rgb(255, 255, 255); outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Infosecurity Group Websites * * Magazine * Events * Infosecurity Europe * Infosecurity Leadership Summit * Infosecurity Magazine Events * Infosecurity North America * Infosecurity Netherlands * Infosecurity Belgium * Infosecurity Russia * Infosecurity Mexico * Infosecurity Middle East * Insight * Infosecurity Webinars * Infosecurity Whitepapers * Infosecurity Online Summits * Log In * Sign Up * × search * News * Magazine Features * Opinions * News Features * Interviews * Editorial * Blogs * Reviews * Slackspace * Next-Gen Infosec * Webinars * White Papers * Podcasts * Industry Events & Training * Magazine Events * Online Summits * Company Directory * Application Security * Automation * Big Data * Business Continuity * Cloud Security * Compliance * Cybercrime * Data Protection * Digital Forensics * Encryption * Human Factor * Identity Access Management * Industry Announcements * Internet Security * Malware * Managed Services * Mobile Security * Network Security * Payment Security * Physical and Information Security Convergence * Privacy * Risk Management * The Internet of Things * Infosec Blog * Log In * Sign Up Latest * NATO Launches Massive Cyber-Defense Exercise * Cuba Ransomware Actors Pocket $60m * Trojan Steals Facebook Details from Over 300K Victims * Hackers Target Colombia's Healthcare System With Ransomware * Spyware Vendor Variston Exploited N-Days in Chrome, Firefox, Windows * * News * Topics * Features * Webinars * White Papers * Podcasts * Events & Conferences * Directory * Search * × search Infosecurity Magazine Home » News » Police Shutter 13,000 Sites in Piracy Crackdown 29 Nov 2022 News POLICE SHUTTER 13,000 SITES IN PIRACY CRACKDOWN PHIL MUNCASTER UK / EMEA NEWS REPORTER, INFOSECURITY MAGAZINE * Email Phil * Follow @philmuncaster A wide-ranging effort to disrupt counterfeiting and online piracy across the EU resulted in the closure of 12,526 websites hosting illegal content, according to Europol. As of this week's Cyber Monday, police disconnected 32 servers used to distribute the content for 2294 television channels. They also shuttered 15 online stores selling counterfeit products on social media sites and seized 127,365 fake clothes, watches, shoes, accessories, perfumes, electronics and other items worth over €3.8m ($3.9m). Law enforcers across 27 countries participated in Europol’s 13th Operation In Our Sites, which ran from May 1 to November 14. The agency warned that a growing number of counterfeit items are made today inside the EU, and that IP-related offenses are increasingly linked to serious and organized crime. In total, 10 search warrants were issued and 14 people detained or accused of IP crimes, including four who were arrested in Spain. According to Europol, the prime suspect in this case had been earning €150,000 per month and lived in a luxury villa, drove expensive cars and took luxury holidays all over the world. The criminal network they worked for apparently generated funds from marketing and distributing pirated AV content on the internet. Meanwhile, police in Bulgaria probed a criminal network using Facebook accounts and websites to sell counterfeit clothes imitating well-known brands. Workshops featuring sewing and embossing machines were raided and items worth €35,000 were seized, Europol said. The policing organization urged consumers to be on their guard when buying items online. It added that social media channels are often used to promote e-commerce stores selling counterfeit products. In some cases, the criminal networks also receive revenue from brands wanting to advertise on their sites. It claimed even “prestigious brands” may accidentally publish their ads on such domains. A Europol report released in March claimed that the value of counterfeit goods in 2019 was €119bn or nearly 6% of total EU imports. However, the number has likely surged during the pandemic thanks to the expansion of e-commerce during the period, it warned. Related to This Story * Global Cops Shut 31,000 Domains in IP Crackdown * Europol Takes Thousands of Piracy and Fraud Sites Offline * Police Celebrate Arrest of 59 Suspected Scammers * UK Government Flings Millions at Anti-Piracy Campaign * European Police Warn of Metaverse Cyber-Threats WHAT’S HOT ON INFOSECURITY MAGAZINE? * Read * Shared * Watched * Editor's Choice 1 8 Jul 2021 News NEW PRINTNIGHTMARE PATCH CAN BE BYPASSED, SAY RESEARCHERS 2 8 Jul 2021 News CYBERCRIME COSTS ORGANIZATIONS NEARLY $1.79 MILLION PER MINUTE 3 8 Jul 2021 News CTOS KEEPING QUIET ON BREACHES TO AVOID CYBER BLAME GAME 4 7 Jul 2021 News OVER 170 SCAM CRYPTOMINING APPS CHARGE FOR NON-EXISTENT SERVICES 5 7 Jul 2021 News MOST INSIDER DATA BREACHES AREN'T MALICIOUS 6 7 Jul 2021 News KREMLIN HACKERS REPORTEDLY BREACHED REPUBLICAN NATIONAL COMMITTEE 1 2 Dec 2022 News NATO LAUNCHES MASSIVE CYBER-DEFENSE EXERCISE 2 2 Dec 2022 News CUBA RANSOMWARE ACTORS POCKET $60M 3 2 Dec 2022 News TROJAN STEALS FACEBOOK DETAILS FROM OVER 300K VICTIMS 4 1 Dec 2022 News HACKERS TARGET COLOMBIA'S HEALTHCARE SYSTEM WITH RANSOMWARE 5 1 Dec 2022 News SPYWARE VENDOR VARISTON EXPLOITED N-DAYS IN CHROME, FIREFOX, WINDOWS 6 1 Dec 2022 News WHATSAPP FILES ON DARK WEB SHOW MILLIONS OF RECORDS FOR SALE 1 8 Jul 2021 Webinar OVERCOMING 'SHADOW IT' NEED AND RISK 2 23 Sep 2021 Webinar HOW TO RETHINK END-USER PROTECTION AND ELIMINATE PHISHING AND RANSOMWARE 3 21 Oct 2021 Webinar MACHINE ID MANAGEMENT AND DIGITAL TRANSFORMATION: BUILDING A SECURE FUTURE 4 16 Sep 2021 Webinar NEW STRATEGIES FOR MANAGING MACHINE IDENTITIES 5 7 Oct 2021 Webinar THIRD-PARTY VULNERABILITIES: DEMYSTIFYING THE UNKNOWN 6 24 Jun 2021 Webinar DEFINING THE ZERO TRUST AND SASE RELATIONSHIP 1 3 Feb 2022 Podcast INTOSECURITY CHATS, EPISODE 8: BRIAN HONAN, BROUGHT TO YOU BY HP 2 11 Aug 2022 News #BHUSA: RUSSIA'S WIPER ATTACKS AGAINST UKRAINE DETAILED 3 15 Aug 2022 Blog HELLO FROM YOUR NEW EDITOR 4 11 Aug 2022 News #BHUSA: THE CYBER SAFETY REVIEW BOARD OUTLINES LOG4J LESSONS 5 15 Aug 2022 News #DEFCON: HOW SANCTIONS IMPACT INTERNET OPERATORS 6 15 Aug 2022 News LUCKYMOUSE USES COMPROMISED MIMI CHAT APP TO TARGET WINDOWS AND LINUX SYSTEMS * The Magazine * About Infosecurity * Subscription * Meet the Team * Contact Us * Cookies Settings * Advertisers * Media Pack * Contributors * Forward Features * Op-ed * Next-Gen Submission * Copyright © 2022 Reed Exhibitions Ltd. * Terms and Conditions * Privacy Policy * Intellectual property statement * Cookie Policy * Sitemap * Please wait… We use cookies to analyse and improve our service, to improve and personalise content, advertising and your digital experience. We also share information about your use of our site with our social media, advertising and analytics partners. Cookie Policy Accept All Cookies Cookies Settings COOKIE PREFERENCE CENTRE We process your information, to deliver content or advertisements and measure the delivery of such content or advertisements, extract insights, and generate reports to understand service usage; and/or accessing or storing information on devices for that purpose. You can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more, to change our default settings, and/or view the list of Google Ad-Tech Vendors. Cookie Policy MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details UNCATEGORISED COOKIES Uncategorised cookies Uncategorised cookies are cookies that we are in the process of classifying, together with the providers of individual cookies. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors All Consent Allowed * HOST DESCRIPTION View Cookies REPLACE-WITH-DYANMIC-HOST-ID * Name cookie name Confirm My Choices