10 March 2021

Dutch and Belgian police reportedly shut down messaging app used by criminals


Dutch and Belgian police reportedly shut down messaging app used by criminals

Police in the Netherlands and Belgium said it took action against the encrypted messaging app Sky ECC widely used by criminals across the globe.

The Dutch police said they have been monitoring “live” traffic on the encrypted messaging service over the past three weeks, which eventually led to arrests of 30 suspects in the Netherlands part of “Operation Argus.” The authorities said that some 48 criminals were arrested by about 1,500 police officers in coordinated raids in Belgium.

According to the officials, the investigators have been able to decrypt and read the SkyECC traffic in real time since mid-February. During that time they have had access to hundreds of millions of messages the service's users sent, uncovering information about "dozens" of attempts to plan violent crimes in the Netherlands, such as kidnappings, shootings, and assassinations. The police did not say how they managed to crack the encryption.

The Sky ECC app became popular last year after the police took similar actions against EncroChat, an encrypted messaging service favored by criminal gangs. The Dutch police said that Sky ECC is now the largest encrypted messaging platform amassing more than 70,000 users, with 11,000 of them in the Netherlands.

In a statement released Tuesday, the company behind Sky ECC denied allegations that authorities have cracked its software.

“Sky ECC received notification of several articles published in Belgium and the Netherlands alleging that Belgian and/or Dutch authorities have cracked or hacked SKY ECC encrypted communication software. SKY ECC maintains, after thorough investigation, that all such allegations are false,” the company said. “SKY ECC authorized distributors in Belgium and the Netherlands brought to our attention that a fake phishing application falsely branded as SKY ECC was illegally created, modified and side-loaded onto unsecure devices, and security features of authorized SKY ECC phones were eliminated in these bogus devices which were then sold through unauthorized channels.”

“SKY ECC has not been contacted by any investigative authority. SKY ECC did not authorize or cooperate with the investigative authorities or those involved with the distribution of the fake phishing application. These actions are malicious and SKY ECC is actively investigating and pursuing legal action against the offending individuals for impersonation, false lights, trademark infringement, injurious falsehood, defamation, and fraud,” it added.

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024