Inside Africa’s Largest Cybercrime Takedown: The 651 Arrests That Shook the Underworld
A sweeping INTERPOL-led operation across 16 African nations uncovers the scale and tactics of a sprawling cybercrime ecosystem.
It began before dawn, as law enforcement teams fanned out across cities from Lagos to Nairobi. By the end, 651 alleged cybercriminals were in custody, millions in illicit gains had been seized, and a continent-wide network of scams lay exposed. Operation Red Card 2.0, the latest and largest cybercrime crackdown in African history, is sending shockwaves through the digital underworld - and a clear message to its operators: nowhere is safe.
Fast Facts
- 651 suspects arrested across 16 African countries in coordinated raids
- Over $4.3 million recovered; financial losses linked to the operation exceed $45 million
- 1,247 victims identified; 2,341 devices and 1,442 malicious websites seized or taken down
- Major takedowns included Nigerian phishing cells, Kenyan social media fraud rings, and Ivorian predatory loan app operators
- Operation Red Card 2.0 follows a series of continent-wide cybercrime crackdowns by INTERPOL
The Anatomy of a Digital Dragnet
Orchestrated by the African Joint Operation against Cybercrime (AFJOC) and INTERPOL, Operation Red Card 2.0 targeted a spectrum of scams plaguing the continent: investment fraud, mobile money schemes, and fake loan applications. The numbers are staggering. In just two months, authorities identified over a thousand victims and linked the criminal networks to more than $45 million in losses.
In Nigeria, investigators dismantled a sophisticated investment fraud syndicate that preyed on youth, recruiting them to launch phishing campaigns and engineer fake investment opportunities. The group’s reach was amplified by over 1,000 fraudulent social media profiles, used as bait to lure in unwitting investors. Simultaneously, a notorious cyber gang exploiting stolen employee credentials to breach telecom infrastructure was neutralized, with six ringleaders arrested.
Kenya saw 27 suspects apprehended in connection with social media and messaging app-based scams. These operations often lure victims with promises of high returns, only to siphon off their savings. Meanwhile, authorities in Côte d'Ivoire cracked down on predatory mobile loan apps, arresting 58 individuals accused of trapping users with hidden fees and aggressive debt collection tactics.
Beyond the arrests, the operation struck at the infrastructure of cybercrime. Over 2,300 devices and more than 1,400 malicious digital assets - websites, domains, servers - were seized or dismantled, disrupting the technical backbone that enables these scams to proliferate.
INTERPOL’s Neal Jetton emphasized the psychological and financial toll on victims and hailed the results as proof that international collaboration is essential to fighting cybercrime’s borderless threat. With previous operations like Serengeti and Africa Cyber Surge setting the stage, Red Card 2.0 marks a new high-water mark in the continent’s fight against digital fraudsters.
Aftermath and the Road Ahead
For Africa’s cybercriminals, the message is clear: the era of impunity is ending. But for law enforcement, the challenge is far from over. As digital ecosystems expand and scams become more sophisticated, only relentless cooperation and innovation will keep pace. Operation Red Card 2.0 is a milestone - but it’s just the opening salvo in a long, high-stakes battle for Africa’s digital future.
WIKICROOK
- Phishing: Phishing is a cybercrime where attackers send fake messages to trick users into revealing sensitive data or clicking malicious links.
- Investment Fraud: Investment fraud is a scam where criminals trick people into investing money in fake or risky schemes, often by promising high returns with little risk.
- Mobile Money Scam: A mobile money scam is a fraud where attackers exploit mobile payment systems to steal funds or trick users into sending money through deceptive tactics.
- Malicious Website: A malicious website is created to harm users by spreading malware or stealing data. It often mimics trusted sites to deceive and exploit visitors.
- Identity Theft: Identity theft is a crime where someone uses another person's personal data without consent, often to commit fraud or financial theft.