Cybercrime Crackdown Across Africa: Inside Interpol’s Operation Contender 3.0

In recent years, Africa has witnessed an unprecedented surge in cyber-enabled crimes. With internet penetration growing rapidly across the continent, digital platforms have become powerful tools for communication, commerce, and social interaction. But alongside these positive developments, criminal networks have seized on new opportunities to exploit vulnerable individuals online.

According to INTERPOL’s 2025 Africa Cyberthreat Assessment Report, two-thirds of surveyed African countries indicated that cyber-related offences now represent a medium-to-high proportion of all crimes. The continent, once seen as relatively disconnected from global digital crime trends, has become an increasingly important battleground for law enforcement and cybersecurity experts.

This reality set the stage for Operation Contender 3.0, a massive international law enforcement initiative conducted from 28 July to 11 August 2025. Spearheaded by INTERPOL in collaboration with national police forces, cybersecurity firms, and international donors, the operation resulted in the arrest of 260 suspects across 14 African countries, the seizure of 1,235 electronic devices, and the dismantling of 81 cybercrime infrastructures. Authorities also identified 1,463 victims linked to romance scams and sextortion, with estimated financial losses nearing USD 2.8 million.

The scale and coordination of the operation represent one of the most significant crackdowns on cybercrime in Africa’s history. To understand its impact, it is essential to examine not only the numbers but also the methods, victims, and broader implications of this transnational effort.

The Anatomy of Digital Deception: Romance Scams and Sextortion

Two primary forms of online crime dominated Operation Contender 3.0: romance scams and sextortion. While these schemes differ in execution, both rely heavily on manipulation, deception, and psychological pressure.

Cyril Gout, Acting Executive Director of Police Services at INTERPOL, summarized the issue succinctly:

“Cybercrime units across Africa are reporting a sharp rise in digital-enabled crimes such as sextortion and romance scams. The growth of online platforms has opened new opportunities for criminal networks to exploit victims, causing both financial loss and psychological harm. By working closely with our member countries and private sector partners, we remain committed to disrupting and dismantling the groups that prey on vulnerable individuals online.”

This statement underscores not only the financial stakes but also the human cost of cyber-enabled exploitation.

Operation Contender 3.0: A Coordinated Strike

Launched under the African Joint Operation against Cybercrime project, funded by the United Kingdom’s Foreign, Commonwealth and Development Office (FCDO), Operation Contender 3.0 built on the lessons of its predecessors. It combined digital forensics, intelligence-sharing, and on-the-ground enforcement.

Key aspects included:

  1. Data Collection and Analysis: Investigators traced IP addresses, digital infrastructures, domains, and social media accounts linked to criminal syndicates. This intelligence allowed police to map out networks and identify targets.
  2. Device Seizures: Over 1,235 electronic devices were confiscated, including laptops, mobile phones, USB drives, and SIM cards. These devices will undergo forensic analysis to uncover additional evidence and potential victims.
  3. Infrastructure Takedown: Authorities dismantled 81 digital infrastructures ranging from fraudulent websites to communication hubs crippling the ability of networks to operate.
  4. Victim Identification: Investigators traced scams back to 1,463 identified victims, whose losses amounted to nearly USD 2.8 million. This figure represents only confirmed cases; the true number is likely higher given the underreporting of cybercrime.
  5. International Partnerships: Collaboration with cybersecurity firms Group-IB and Trend Micro played a crucial role in analyzing data, strengthening operational capabilities, and supporting cross-border enforcement.

Country by Country Breakdown

While the overall results of Operation Contender 3.0 are impressive, the detailed outcomes in individual countries reveal the diversity of tactics employed by criminals and the scale of the problem.

Ghana

Ghanaian authorities arrested 68 individuals, seized 835 devices and identified 108 victims.

Ghana’s operation was the largest in terms of devices seized. Suspects engaged in both romance scams and sextortion. In romance cases, they fabricated entire identities with stolen images and forged documents. They then extracted payments through fabricated courier fees, customs charges, and other pretexts. In sextortion incidents, suspects recorded explicit video chats and later used them as leverage for blackmail.

Senegal

In Senegal, criminals impersonated celebrities on social media and dating platforms. By exploiting the trust and admiration that victims felt for these personalities, they manipulated individuals into sending money.

Côte d’Ivoire

One of the most striking figures emerged from Côte d’Ivoire, where police dismantled a major sextortion ring. The group used fake online profiles to lure vulnerable individuals into sharing intimate material. Once obtained, this content became the basis for blackmail. With over 800 identified victims, the case highlights the vast scale and destructive potential of such operations.

Angola

In Angola authorities arrested 8 individuals who used social media to target their victims.

In Angola, offenders focused on identity fraud, using forged documents to create fake personas. These false identities were employed to facilitate financial transactions and conceal the true actors behind the scams.

The Role of Technology and International Cooperation

One of the defining features of Operation Contender 3.0 was the integration of public and private sector resources. While law enforcement provided local intelligence and enforcement capabilities, companies like Group-IB and Trend Micro contributed advanced data analysis, threat intelligence, and cybersecurity expertise.

This synergy allowed for real-time information sharing and swift cross-border responses. For instance, an IP address flagged in Ghana could be immediately cross-referenced with activity in Nigeria or Côte d’Ivoire, ensuring that criminal networks could not simply shift operations across borders to evade detection.

The operation also benefited from funding by the UK’s FCDO, underscoring the importance of international investment in global cybercrime prevention.

Victims and the Human Toll

While the statistics of Operation Contender 3.0 are striking, the human stories behind the numbers are equally important. Victims of romance scams often describe feelings of deep betrayal, shame, and financial devastation. In many cases, individuals not only lose money but also face strained family relationships and social stigma once the truth emerges.

Victims of sextortion suffer even more acute trauma. The fear of intimate material being made public can cause severe psychological harm, sometimes leading to depression, anxiety, or worse. Law enforcement agencies stress the importance of victims coming forward, both to stop further exploitation and to support broader investigations.

Broader Implications for Africa and Beyond

The outcomes of Operation Contender 3.0 highlight several key realities:

Conclusion

Operation Contender 3.0 marks a milestone in the global fight against cybercrime. With 260 arrests, 81 infrastructures dismantled, and millions in losses exposed, it demonstrates both the scale of the challenge and the effectiveness of coordinated international responses.

Yet the operation is only a step in a much larger battle. As criminals adapt and develop new tactics, law enforcement must remain equally agile. Greater investment in cybersecurity, stronger international frameworks, and expanded victim support systems will be essential moving forward.

For now, the results of Operation Contender 3.0 provide hope that through collaboration, vigilance, and determination, it is possible to strike meaningful blows against the digital predators exploiting vulnerable individuals across Africa and beyond.

Participating countries: Angola, Benin, Burkina Faso, Cote d’Ivoire, Gambia, Ghana, Guinea, Kenya, Nigeria, Rwanda, Senegal, South Africa, Uganda and Zambia.

How useful was this post?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 2

No votes so far! Be the first to rate this post.

Exit mobile version