Interpol coordinated Operation Serengeti 2.0 between June and August 2025. The campaign spanned 18 African countries and the UK. Authorities arrested 1,209 people directly connected to cybercrime.
They also recovered nearly $97.4 million from fraudulent operations. Investigators shut down 11,432 malicious websites, networks, and accounts used for scams. These takedowns disrupted:
- Business email compromise schemes
- Identity theft operations
- Ransomware attacks
- Fake online investment programs
The operation identified almost 88,000 victims. Many were businesses targeted by advanced cross-border frauds, while others were private citizens.
High-Impact Cases Across Africa
Several cases reveal the wide scope of criminal activity. In Angola, police uncovered 25 illegal cryptocurrency mining centers. Sixty Chinese nationals controlled the sites. Authorities seized $37 million worth of equipment, which will now support energy supplies in local communities.
In Zambia, investigators exposed a crypto investment fraud. Criminals tricked 65,000 people and stole nearly $300 million. Police arrested 15 suspects and confiscated:
- Computer servers used to run the scheme
- Bank accounts linked to the stolen money
- Hundreds of phone numbers tied to the operation
The same investigation exposed a human trafficking network, showing how cybercrime fuels wider criminal enterprises.
Ivory Coast also dismantled an international inheritance scam. Fraudsters convinced victims to pay fees for false claims, stealing $1.6 million. The operation originated in Germany but spread across several countries.
Cooperation and Future Challenges
Interpol stressed that Serengeti 2.0 succeeded because nations worked together. Cybercrime does not stop at borders, so authorities must share intelligence in real time.
The operation highlights several lessons for the future:
- Cybercriminals constantly change tactics and adapt quickly.
- Old scams, such as inheritance fraud, still generate large profits.
- Criminal groups often combine online fraud with human exploitation.
- Effective defense requires technology, training, and regional partnerships.
For businesses and individuals, the message is clear: protection requires constant attention. Organizations must strengthen defenses and invest in staff awareness. Citizens should remain skeptical of investment opportunities, inheritance offers, or suspicious emails.
Eye World emphasizes that security demands a proactive approach. Serengeti 2.0 shows how strong cooperation can cripple cybercrime, but criminals will return with new methods. Awareness, layered defenses, and collaboration are the best ways forward.