Latest news

[Cybercrime] The Netherlands is searching for these 5 cybercriminals and money mules [Pictures included]

Cybercriminals are stealing money from unaware users and victims. The Dutch police have tracked various cybercriminals, but they have decided to publish the faces of 5 cybercriminals which are active in The Netherlands.

The cybercriminals have used various “cybercrime” methods to steal and use banking information from their victims.


This is one of the methods a cybercriminal will use to get money fast. The cybercriminal sends an e-mail which lures people to a fake website; usually the cybercriminals fake a bank. The victim is lured to supposedly verify the credentials. The crafted website looks like the real website, where people unsuspectingly log in with their username, password or credit card number.

Casher 1

There are surveillance images of some cashers. This man pinned in Amsterdam at the IJburglaan IJburg.

He wears an earring in both ears. Furthermore, the fur trim falls to his hood and his hat contains an icon.


Casher 2

This casher pinned in Rotterdam. He wears his hair back and it seems that he has a mustache.


Casher 3

The same man appears at a different PIN transaction in Rotterdam. Now he has pretty long hair that he wears in a ponytail. In his left he has an earring. He’s here in the company of another man with short hair, a mustache and a beard.


Casher 4

He pinned in Amsterdam and wore a coat from Hugo Boss.


Casher 5

He pinned in Almere.





If you liked this post, say thanks by sharing it:
About CWZ (14819 Articles)
Founder of

You only need 5 seconds to join the Cyberwarzone Newsletter

More information and details can be found here.



spyClicking the image will navigate you to the Cyberwarzone homepage
More in Cybercrime, Cybersecurity
xss vulnerability millions of websites
[SHOCKING] Cross-site scripting vulnerability in millions of web sites

CROSS POSTED OFFICIAL AUTHOR: Sijmen Ruwhof CROSS POSTED In August 2014 I found a severe cross-site scripting security vulnerability in the...