Operation Ramz seizes 53 servers linked to cyber scams and malware threats


INTERPOL’s Operation Ramz has led to 201 arrests, the seizure of 53 servers, and the identification of 3,867 cybercrime victims across the Middle East and North Africa.

The operation ran from October 2025 to February 28, 2026, with 13 countries taking part. Investigators also identified 382 additional suspects and shared nearly 8,000 pieces of intelligence to support national investigations.

The crackdown focused on phishing infrastructure, malware activity, compromised devices, and online scams that caused financial and personal harm across the region.

What Operation Ramz uncovered

Operation Ramz targeted the infrastructure that helps cybercriminal groups scale attacks. That included servers used for phishing kits, malware delivery, stolen data handling, and scam operations.

INTERPOL said the action marked the first cyber operation of this scale coordinated by the agency in the MENA region. The goal was not only to arrest suspects, but also to prevent future losses by disrupting the systems that supported criminal campaigns.

The operation brought together law enforcement agencies, private cybersecurity companies, and regional partners. That mix helped investigators connect technical evidence with real-world suspects and victims.

Operation Ramz resultConfirmed figure
Arrests201
Additional suspects identified382
Victims identified3,867
Servers seized53
Countries involved13
Intelligence items sharedNearly 8,000

Thirteen countries took part

The participating countries were Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and the United Arab Emirates.

The operation focused on cybercrime networks operating across borders. That mattered because phishing kits, malware servers, stolen credentials, and scam platforms can support victims and suspects in several countries at once.

By sharing intelligence during the operation, investigators could move faster against servers, fraud schemes, and people behind the campaigns.

Qatar found compromised devices spreading malware

In Qatar, intelligence from Operation Ramz helped investigators identify compromised devices that were being used to spread malicious threats.

The device owners were not treated as suspects in that part of the operation. Investigators found that they were victims themselves and did not know their systems had been hijacked.

The affected devices were secured, and owners were notified so they could take preventive action. This part of the operation highlights how attackers can turn ordinary users’ devices into malware distribution points without their knowledge.

Jordan uncovered a scam operation tied to trafficking

Jordanian police traced a computer used in financial fraud scams. Victims were pushed toward what looked like a legitimate trading platform, which shut down after deposits were made.

A raid uncovered 15 people carrying out the scam. Investigators later determined that those individuals were victims of human trafficking who had been recruited from Asian countries under false job promises.

Dismantles 53 Servers

Their passports were confiscated after arrival, and they were forced or coerced into taking part in the fraud. Two people suspected of organizing the operation were arrested.

Oman, Algeria, and Morocco also disrupted cybercrime activity

In Oman, investigators found a server in a private residence that contained sensitive information. The owner had legitimate access to the information, but the server had serious security weaknesses and a malware infection.

Authorities disabled the server to prevent further harm. In Algeria, investigators dismantled a phishing-as-a-service website, seized a server, computer, mobile phone, and hard drives, and arrested one suspect.

Moroccan authorities seized computers, smartphones, and external hard drives containing banking data and phishing tools. Three people are undergoing judicial procedures, while others remain under investigation.

CountryOperational highlight
QatarCompromised devices used to spread malware were secured and owners were notified
JordanFinancial fraud scheme disrupted, with trafficking victims identified and two organizers arrested
OmanVulnerable malware-infected server containing sensitive information was disabled
AlgeriaPhishing-as-a-service platform dismantled and one suspect arrested
MoroccoDevices containing banking data and phishing tools were seized

Private-sector intelligence helped investigators

INTERPOL worked with Group-IB, Kaspersky, the Shadowserver Foundation, Team Cymru, and TrendAI during the operation.

These partners helped track malicious infrastructure, identify servers, map phishing activity, and provide intelligence that law enforcement could use in investigations.

Group-IB said it supplied intelligence on more than 5,000 compromised accounts, including accounts linked to government infrastructure. It also mapped phishing infrastructure and threat actor clusters operating across the region.

  • Group-IB contributed intelligence on compromised accounts and phishing infrastructure.
  • Kaspersky provided threat intelligence on malware distribution and command-and-control infrastructure.
  • Shadowserver Foundation, Team Cymru, and TrendAI supported infrastructure tracking and analysis.
  • INTERPOL coordinated intelligence sharing among participating countries.

Why the server seizures matter

The seizure of 53 servers disrupted the technical backbone of multiple cybercrime activities. Servers can host phishing pages, store stolen data, distribute malware, relay traffic, or support scam platforms.

Taking down infrastructure does not always end a cybercrime group. Attackers can rebuild. However, seizures can interrupt campaigns, expose evidence, identify victims, and give investigators leads on operators and customers.

That is why Operation Ramz focused on both arrests and infrastructure disruption. The two parts work together: seized servers can reveal suspects, and arrested suspects can reveal more infrastructure.

Cybercrime and organized crime are overlapping

The Jordan case shows how online scams can connect with human trafficking and forced labor. This pattern has appeared in other scam compounds and fraud operations around the world.

In these schemes, some people seen operating scams may also be victims. They may have been recruited through fake jobs, transported across borders, and forced into cyber-enabled fraud.

That overlap makes cybercrime investigations more complex. Law enforcement must identify organizers and technical operators while also protecting people forced to participate.

What users and organizations can learn from Operation Ramz

Operation Ramz shows that phishing, malware, and investment fraud continue to depend on both technical infrastructure and social engineering.

Users should treat trading platforms, investment offers, and urgent account messages with caution. Organizations should watch for compromised devices being used as part of larger criminal infrastructure.

Security teams should also monitor for unusual outbound traffic, suspicious login attempts, phishing kits, and unauthorized remote access tools.

  • Verify investment platforms before sending money.
  • Use multi-factor authentication on email, banking, and business accounts.
  • Keep routers, phones, laptops, and servers patched.
  • Monitor devices for unknown remote access tools or malware alerts.
  • Report suspected phishing pages and scam platforms quickly.
  • Do not assume only computers can be abused by attackers.

Why Operation Ramz matters for MENA cybercrime enforcement

Operation Ramz signals a more coordinated regional response to cybercrime across the Middle East and North Africa.

The operation combined victim identification, intelligence sharing, arrests, server seizures, and public-private cooperation. That approach matters because modern cybercrime networks move across countries faster than traditional investigations can move alone.

Future operations will likely build on this model. The pressure on phishing-as-a-service platforms, malware operators, and scam networks will depend on fast intelligence sharing and continued cooperation between law enforcement and cybersecurity companies.

FAQ

What is Operation Ramz?

Operation Ramz is an INTERPOL-coordinated cybercrime crackdown across the Middle East and North Africa. It targeted phishing infrastructure, malware threats, compromised devices, and online scam operations.

How many arrests were made in Operation Ramz?

INTERPOL said Operation Ramz led to 201 arrests. Investigators also identified 382 additional suspects and 3,867 victims.

How many servers were seized in Operation Ramz?

Authorities seized 53 servers linked to cybercriminal activity, including phishing, malware, and scam infrastructure.

Which countries participated in Operation Ramz?

The participating countries were Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Libya, Morocco, Oman, Palestine, Qatar, Tunisia, and the United Arab Emirates.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages