GLOBAL scam attempts jumped by 65% over the past year, according to a new study from behavioral biometrics company BioCatch.
The report also identified a 100% spike in voice phishing (vishing) scam attempts between 2024 and 2025, and a 63% uptick in attempted romance scams.
Subscribe now to have unlimited access
With our membership subscription, you will have unlimited access to the AML Intelligence site, updated daily with the latest analysis, opinion, and breaking news across the sector, newsletter delivered twice per week, access to our Global Bank Fines & Penalties database, free access to Boardroom Series and more!
3,354 individuals prosecuted in Europol-coordinated hit against pharmaceutical crime networks
Europol
Between April and November 2025, law enforcement, judicial, customs, medical and anti-doping authorities from 30 countries joined forces in Operation SHIELD VI. Europol coordinated this global effort targeting the trafficking of counterfeit and misused medicines, as well as illicit doping substances and food supplements. As in the previous operations, the 2025 edition was supported by the European Anti-Fraud Office (OLAF), the European Union Intellectual Property Office (EUIPO), Frontex, INTERPOL, the World Anti-Doping Agency (WADA) and national medicine agencies.
Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools
OFAC
WASHINGTON — Today, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) designated Sergey Sergeyevich Zelenyuk (Zelenyuk) and his company, Matrix LLC (doing business as Operation Zero), as well as five associated individuals and entities, for their acquisition and distribution of cyber tools harmful to U.S. national security. Zelenyuk and Operation Zero trade in “exploits”—pieces of code or techniques that take advantage of vulnerabilities in a computer program to allow users to gain unauthorized access, steal information, or take control of an electronic device—and have offered rewards to anyone who will provide them with exploits for U.S.-built software. Among the exploits that Operation Zero acquired were at least eight proprietary cyber tools, which were created for the exclusive use of the U.S. government and select allies and which were stolen from a U.S. company. Operation Zero then sold those stolen tools to at least one unauthorized user.