logo
Cambodia cybercrime crackdown arrest tally hits 2,000

Cambodia cybercrime crackdown arrest tally hits 2,000

CNA2 days ago
PHNOM PENH: The number of suspects arrested in a Cambodian crackdown on internet scam centres has risen to 2,000, a government minister told AFP on Friday (Jul 18).
The United Nations has described Southeast Asia as the "ground zero" of cybercrime centres, where workers typically use romance or business cons to defraud web users of an estimated US$40 billion annually.
Cambodian Prime Minister Hun Manet this week issued a directive telling law enforcement and the military to clamp down on the internet sweatshops or risk losing their jobs.
Information minister Neth Pheaktra, a member of a committee to combat online scams, told AFP authorities had expanded the scope of their raids to nine of the country's 25 provinces.
"So far, some 2,000 suspects have been arrested," he said, adding that the suspects include Chinese, Vietnamese, Indonesian and Indian nationals.
Neth Preaktra said the government wants to make the country "no safe haven for online scammers" and "will dismantle every scam network no matter where they hide".
At least 226 Chinese nationals were among the detained suspects, according to a police report, which said some ringleaders would face prosecution in Cambodia while most others would be expelled.
The justice ministry also said it had suspended one prosecutor pending an investigation after he released several cybercrime suspects.
Abuses in Cambodia's scam centres are happening on a "mass scale", Amnesty International said in a report published last month.
There are at least 53 scam compounds in Cambodia where organised criminal groups carry out human trafficking, forced labour, child labour, torture, deprivation of liberty and slavery, the report said.
Many of those freed from Southeast Asian scam centres say they were trafficked or lured there under false pretences.
In March, Cambodia deported 119 Thais - among 230 foreign nationals detained during raids on alleged cyber scam centres in Poipet city.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

SAF and MINDEF units part of Singapore's response to ongoing cyberattack: Chan Chun Sing
SAF and MINDEF units part of Singapore's response to ongoing cyberattack: Chan Chun Sing

CNA

timea day ago

  • CNA

SAF and MINDEF units part of Singapore's response to ongoing cyberattack: Chan Chun Sing

SINGAPORE: Units in the Singapore Armed Forces (SAF) and Ministry of Defence (MINDEF) have been responding to the ongoing cyberattack by an alleged China-linked threat actor on Singapore's critical infrastructure, said Minister for Defence Chan Chun Sing on Saturday (Jul 19). These select units will work with the Cyber Security Agency of Singapore (CSA) in a whole-of-government effort to manage the incident, he added. Coordinating Minister for National Security K Shanmugam first revealed on Friday that Singapore was actively dealing with the "highly sophisticated' UNC3886 group, which he said posed a serious danger to Singapore and could undermine national security. UNC3886 has been described by Google-owned cybersecurity firm Mandiant as a "China-nexus espionage group" that has targeted prominent strategic organisations on a global scale. On Saturday, Mr Chan was one of three Cabinet ministers to address the attack. Minister for Digital Development and Information Josephine Teo said in a Facebook post that Singaporeans should be aware about the ongoing cyberspace threats the country faces, and that there was "never a perfect time" to disclose such incidents. "We always have to strike a fine balance between maintaining operational security and raising public awareness, especially while live operations are ongoing," she added. "Imagine if threat actors succeeded in taking down any of our critical systems, such as water, power or telco networks. The knock-on effects could be devastating." On the sidelines of a community event in Chong Pang on Saturday, Mr Shanmugam was also asked why the Singapore government decided to name the attackers. He said Singaporeans ought to know where the attack was coming from, and that attackers have been named in the past. "The number of incidents we disclose are far smaller than the actual number of attacks, and we don't disclose because of national security or public interest reasons," he added. "This time round, our assessment was that we can disclose those details. I released very little, very few details ... we have confidence as to who the attacker was. So we thought that that is appropriate to disclose." When asked about UNC3886's alleged links to China and possible retaliation for naming them, Mr Shanmugam, who is also Home Affairs Minister, said this was "speculative". "Who they are linked to and how they operate is not something I want to go into," he said. CHINESE EMBASSY RESPONDS On Saturday, the Chinese embassy in Singapore noted that Singapore media outlets had cited "so-called information from a certain country's cybersecurity company" and claimed UNC3886's link to China. The Chinese government expresses "strong dissatisfaction" over the claim and opposes any "groundless smears and accusations", the embassy said in a statement. "The embassy would like to reiterate that China is firmly against and cracks down (on) all forms of cyberattacks in accordance with law. China does not encourage, support or condone hacking activities," it added. "Keeping the cyberspace safe is a global challenge and China stands ready to work with Singapore and the rest of the world to jointly protect cybersecurity." OPERATIONAL READINESS Mr Chan on Saturday described the cyberattacks as an example of the type of emerging threats that the SAF and MINDEF have had to handle. Speaking to journalists during a visit to Selarang Camp, Mr Chan also addressed the importance of readiness among operationally ready national servicemen (NSmen). Countries can buy machines if they have money, but the "most critical" component of Singapore's defence is the "fighting spirit" of its men, he said. "To see the men being prepared, spend time and effort to maintain their fitness, to maintain their operational currency - that to us is the greatest deterrence that we can have," said the Defence Minister. He pointed to new operational challenges, including the conflicts in Europe and the Middle East, that Singapore is learning lessons from. "Many of these things we would have anticipated prior, and we will be ready. We can't be starting our preparations after we see what people do," said Mr Chan.

Indonesia court jails former trade minister for 4.5 years in sugar graft case
Indonesia court jails former trade minister for 4.5 years in sugar graft case

CNA

time2 days ago

  • CNA

Indonesia court jails former trade minister for 4.5 years in sugar graft case

JAKARTA: An Indonesian court on Friday (Jul 18) sentenced a former trade minister to 4.5 years in jail for improperly granting sugar import permits that authorities said had caused nearly 600 billion rupiah (US$36.84 million) in state losses. Thomas Trikasih Lembong served as trade minister in 2015 and 2016 under President Joko "Jokowi" Widodo. Once seen as Jokowi's close aide, Lembong turned into one of the government's staunchest critics after leaving office. Judges at the corruption court in the capital Jakarta said Lembong, as minister, was guilty of improperly granting import permits for sugar to private companies when the Southeast Asian country had a surplus of sugar. Indonesia's sugar output in 2015 was 2.49 million metric tons, while consumption was 2.12 million. In last year's presidential election, Lembong was the campaign manager for candidate Anies Baswedan. The election was won in a landslide by Prabowo Subianto, whom Jokowi backed. Lembong, who was arrested days after Prabowo's inauguration last year, had claimed in court that his prosecution was due to his involvement in the opposition camp, local media reported. Prosecutors had denied his arrest was politically motivated. "The defendant was proven legally and convincingly to be guilty of having committed a corruption act," Judge Purwanto S Abdullah said, to jeers from the crowd. Before handing the sentence, the judges had argued the import permits did not go through the proper procedures of consulting with other state bodies and that he had prioritised "capitalistic" interests over social justice. However, the judges said he did not enrich himself, leading to a shorter sentence than the seven years prosecutors had demanded. Prosecutors said Lembong had enriched the private companies. Holding up his handcuffed hands, Lembong told reporters after the sentencing that he would consider whether or not to appeal, saying judges had ignored his defence team.

Singapore actively dealing with ongoing cyberattack on critical infrastructure: Shanmugam
Singapore actively dealing with ongoing cyberattack on critical infrastructure: Shanmugam

CNA

time2 days ago

  • CNA

Singapore actively dealing with ongoing cyberattack on critical infrastructure: Shanmugam

SINGAPORE: Singapore is actively dealing with UNC3886, a "highly sophisticated threat actor" that is attacking critical infrastructure, Coordinating Minister for National Security K Shanmugam said on Friday (Jul 18). Mandiant, a cybersecurity firm owned by Google, describes UNC3886 as a "China-nexus espionage group" that has targeted prominent strategic organisations on a global scale. The threat actor poses a serious danger to Singapore and could undermine the country's national security, said Mr Shanmugam, who is also Home Affairs Minister. He added that it was not in Singapore's security interests to disclose further details of the attack at this point in time. Elaborating on "advanced persistent threats" (APTs), of which UNC3886 is one, Mr Shanmugam said these were highly sophisticated and well-resourced threat actors. Between 2021 and 2024, suspected APT attacks on Singapore increased more than four-fold, he said. The minister was speaking at a dinner to mark 10 years since the Cyber Security Agency of Singapore (CSA) was established in 2015. In a separate statement, CSA said it was leading investigations into UNC3886 and supporting affected organisations with relevant agencies and partners. "We have been investigating UNC3886's activities since it was detected in parts of our critical infrastructure," the agency said. CSA said it was also monitoring all critical sectors and sharing threat intelligence so that they can take preventive measures. The critical sectors are energy, water, banking and finance, healthcare, transport, government, information and communications, media, and security and emergency services. "These attacks are often protracted campaigns and CSA will need to preserve operational security by not disclosing further information at this stage," it added. Mr Shanmugam said that APTs typically act on state objectives to steal sensitive information and disrupt essential services, attacking critical infrastructure like healthcare, telcos, water, transport and power. He said that UNC3886 deploys advanced tools to compromise systems, and is able to evade detection and maintain persistent access in "victim networks". "Industry has associated UNC3886 with cyberattacks against critical areas including defence, telcos, technology organisations in the United States and in Asia," he said. "The intent of this threat actor in attacking Singapore is quite clear. It is going after high value strategic threat targets, vital infrastructure that deliver essential services. "If it succeeds, it can conduct espionage and it can cause major disruption to Singapore and Singaporeans." MORE DANGEROUS WORLD Mr Shanmugam said that the world faced more dangers in cyberspace now than it did 10 years ago. "It is no longer enough only to guard our most critical systems. Potential targets have increased. They include external vendors, suppliers, service providers along the entire supply chain. Even residential devices like home routers, IP cameras are now being exploited by cyber attackers," he said. He noted that physical conflicts have also spilled over into the digital world, with actors launching cyberattacks to bring down critical infrastructure. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world. And people want to get into our systems, to both influence us and threaten us," he said. In Singapore, nearly 80 per cent of organisations have experienced a cyberattack, most committed by cyber criminals. "'Hacktivists' and foreign actors have also used cyber to promote their agendas. Both political and ideological agendas," said Mr Shanmugam. He noted that in October 2024, the government blocked 10 websites set up by foreign actors that were masquerading as Singapore websites. These had the potential to be used for hostile information campaigns against Singapore, he said. He also recalled last year's cyberattack involving over 2,700 devices in Singapore, including baby monitors and routers. These devices were part of a global "botnet" comprising hundreds of everyday devices that could have been used to disrupt critical services. Mr Shanmugam illlustrated how a cyberattack could destabilise national security. "Say there is a cyberattack on our power systems. They can disrupt our electricity supply. And the knock-on implications: other essential services, like water supply, transport, medical services – in fact, everything that depends on power, everything will be affected. "There are economic implications. Banks, airport, industries would not be able to operate. Our economy can be substantially impacted." Attacks on telco systems and payment systems can also have serious consequences and impact how Singapore does business, he added. Singapore will have to reexamine its vendors and supply chains. "And if we decide that we cannot trust them, then we may choose not to use them," he said. "At the same time, trust and confidence in Singapore as a whole can also be affected. Businesses may shy away if they are unsure about our systems, and whether the systems are clean, resilient, safe." Mr Shanmugam said the government must be "realistic" about what it is up against. "We are up against very sophisticated actors, some backed by countries with vast resources." These resources in manpower and technology are almost unlimited and can be deployed at a "formidable scale", he said. "Even countries at the frontier of technology have not been able to prevent APT attacks on their systems. "So realistically, we will have to accept that some attacks, at least, will get through," he said. In the face of such threats, the government will have to continue to strengthen Singapore's cyberdefences and focus on preventing and containing threats, he said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store