Cambodia continues raids on scam centers, bringing arrests in past 3 weeks over 2,100
PHNOM PENH, Cambodia (AP) — Authorities in Cambodia continued their stepped-up campaign against online scam centers, arresting at least 500 suspects in two provinces on Thursday and Friday, the country's information minister said.
The arrests in Kandal province on the outskirts of the capital Phnom Penh, and in the northeastern province of Stung Treng, brought to 2,137 the total number detained since June 27, Information Minister Neth Pheaktra said in a statement.
Those netted in raids in 43 locations around the country included 429 Vietnamese, 271 Indonesians, 589 Chinese, 57 Koreans, 70 Bangladeshi and 42 Pakistanis, said his statement. Other suspects were from Thailand, Laos, India, Nepal, the Philippines and Myanmar.
The United Nations and other agencies have estimated that cyberscams, most of them originating from Southeast Asia, earn international criminal gangs billions of dollars annually. The cybercriminals pretend friendship or tout phony investment opportunities to cheat their targets around the world.
Neth Pheaktra's statement said Cambodia's crackdown is ongoing 'and will absolutely continue, with a clear mandate from the top leadership to root out all illegal cybercrime activity — regardless of location or affiliation.'
He said it was strengthened by a directive issued Monday by Prime Minister Hun Manet that threatened state personnel at all levels with transfers or dismissal if they failed to act vigorously against cyberscams.
The latest arrests followed 2,418 others in the first six months of the year involving 18 alleged scam operations in different parts of the country, said a report from the National Police Commissioner cited by Neth Pheaktra.
These resulted in 73 prosecutions and 2,322 foreigners being deported, it said.
Workers at scam centers are often recruited under false pretenses and then held captive to work under tight guard.
'Jobseekers from Asia and beyond are lured by the promise of well-paid work into hellish labour camps run by well-organized gangs, where they are forced to scam under the very real threat of violence,' the human rights groups Amnesty International said in a report issued last month.
It said the findings of its 18-month investigation into cyberscams 'suggest there has been coordination and possibly collusion between Chinese compound bosses and the Cambodian police, who have failed to shut down compounds despite the slew of human rights abuses taking place inside.' The kingpins of many online scam operations tend to be ethnic Chinese organized crime bosses, who generally operate outside China in areas with weak law enforcement.
A spokesperson for the Cambodian human rights organization Licadho, which is often critical of the government, noted the country's poor reputation due to cybercrime, and welcomed the crackdown.
'This campaign should have been launched long ago because Cambodia has been criticized by international organizations, the international community, and the United Nations for online fraud in Cambodia, which has affected Cambodia's image, international tourists, investment, security, order, and social security,' Licadko's operations director Am Sam Ath, told The Associated Press.
'However, launching this campaign is good to demonstrate the Royal Government's determination and willingness to prevent and suppress online fraud and trust,' he said, noting that other members of the regional Association of Southeast Asian Nations had also acted this year to suppress online crime.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Forbes
14 minutes ago
- Forbes
How To Fight The Threats Targeting Your Employees' Identities
Damon Fleury is the Chief Product Officer of SpyCloud, a leader in identity threat protection. The cybercrime economy has evolved into a sophisticated marketplace of stolen data, illegally obtained access and enablement services and tools that are readily available at scale. These offerings rely heavily upon data and access stolen with malware, phishing attacks and third-party breaches. For example, this growing industry of underground forums and marketplaces sells pre-built malware tools for less than $10, making it easier for even non-sophisticated cybercriminals to infiltrate organizations. A new generation of resourceful cybercriminals is now efficiently using these darknet resources to target organizations with infostealer malware, advanced phishing attacks, residential proxies that mimic trusted IP addresses from victims' home addresses and more. The impact is eye-opening. According to SpyCloud's 2025 Identity Exposure Report: • About 50% of corporate users were exposed through infostealer malware in the past year. • Seven million credentials were stolen from third-party applications, along with hundreds of thousands of credentials stolen from enterprise AI tools and password managers, exposing sensitive business insights and proprietary data and undermining critical security layers. • As attackers gained access to high-value personal and corporate data, 97% of recaptured phishing data from known breaches contained email addresses, 64% exposed IP addresses and half included location data. These statistics reflect a concerning level of exposure, with massive amounts of sensitive information now in the hands of individuals who lacked the tools or expertise to obtain it just a year ago. To keep up, enterprises must rethink their cybersecurity strategies for a world where anyone can be a threat and every employee a potential target, starting with a clear understanding of what's driving modern cybercrime and where their people are most vulnerable. One-Click Cybercrime: Underground Syndicates And Install Brokers It used to be that actors had to be truly enterprising to be successful, from writing their malware code to developing ways to avoid detection. Now, bad actors can pick up an entire malware kit via a black market site just as easily as the average consumer can make an Amazon purchase. The impacts of these attacks can be devastating. For example, a criminal group known as Scattered Spider recently attacked famed British retailer Marks & Spencer, allegedly using solutions purchased on underground forums. The attack resulted in a drop in the company's share price and millions of dollars in lost revenue. Scattered Spider is one of many groups suspected of using off-the-shelf malware obtained through 'install brokers'—also known as ad brokers or pay-per-install services. These brokers act as intermediaries in the cybercrime supply chain, connecting malware developers with threat actors by distributing malicious software at scale. Install brokers often use advertising networks like Spaxmedia, compromised websites or bundled software to silently install malware on victims' devices. This hands-off infection method allows cybercriminals to steal data, launch phishing campaigns, deploy ransomware and cause widespread damage to an organization's operations, finances and reputation. Any bad actor with a few hundred dollars in crypto can buy access to high-quality, polished, ready-to-install malware and launch it quickly and easily. Criminals can also purchase "malware cryptors'—tools that help evade antivirus software. They can even use install brokers to resell stolen data in bulk for low prices, creating a wholesale club for malicious actors. Holistic Digital Identities: Defending Against Cybercrime Enablement Executives must understand what they're dealing with and shift their perceptions of cybercriminals. So-called "smaller players" like those operating as Scattered Spider can be just as damaging as sophisticated state-sponsored cyberattackers, thanks to their ability to easily purchase readily available, inexpensive, plug-and-play tools. The result is a corporate cyber threat landscape that's more scalable and dangerous than ever before. The problem is that most of the attack methods used by the new wave of cyberattackers leave little to no forensic trail, which makes it hard for businesses to know they've been infiltrated until it's too late. For instance, infostealers leave no trace, allowing criminals to stealthily steal users' identity data like passwords, personally identifiable information (PII) and more. However sly the criminals are, they're generally predictable and almost always go after the same target: an organization's users. Therefore, one of the best defenses against infostealers, PhaaS and other tactics is to use data collected from known breaches and stolen data that's circulating the dark web to build holistic digital identities for your organization's users. I've previously shared insights into the need for digital identity correlation, which enables companies to identify and mitigate threats related to stolen or compromised employee data—everything from social security numbers and emails to phone and credit card numbers. Criminals see exposed users as soft targets they can easily exploit, but this approach helps businesses turn the tables. Piecing together user credentials exposed on the darknet allows businesses to make informed decisions on enabling access, resetting passwords and performing other tasks that protect individuals and the organization. They can effectively harden the soft targets against cybercriminals of all skill levels and defend against attacks. Evolving Enterprise Security To Meet The Moment Malware, phishing platforms, stolen credentials and install broker services are readily available and sold like consumer software, dramatically lowering the barrier to entry for cyberattackers. This shift has redefined the threat landscape, turning low-skill actors into legitimate threats and scaling the impact of cybercrime across industries. As the era of cybercrime enablement expands, enterprise security practices must evolve, too. Instead of focusing exclusively on perimeter defense models, organizations must understand the types of PII today's bad actors possess—and use that information against them to build strong and sustainable security postures. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Yahoo
2 hours ago
- Yahoo
Landmine dispute escalates tensions between Thailand and Cambodia
BANGKOK (Reuters) -Thailand has accused Cambodia of recently placing landmines in a disputed border area after three soldiers were injured, but Phnom Penh said they had veered off agreed patrol routes and triggered a mine left behind from decades of war. Thai authorities made the claim after three soldiers were injured, with one losing a foot, by a landmine explosion while on a routine patrol on July 16 on the Thai side of the disputed border area between Ubon Ratchathani and Cambodia's Preah Vihear province. Cambodia's Defence Ministry denied that new mines had been planted, saying in a statement on Sunday the soldiers had strayed from agreed patrol routes into areas that contain unexploded landmines. The country is littered with landmines laid during decades of war. Thailand's army said on Monday that 10 freshly laid Russian-made PMN-2 type landmines, which are not used or stockpiled by Thailand, were found between July 18 and July 20 in areas near where the soldiers were injured. "This is a clear violation of the sovereignty and territorial integrity of the Kingdom of Thailand and an outright breach of principles that are fundamental to international law," Maratee Nalita Andamo, deputy spokesperson for the Thai Foreign Ministry, said on Monday in Bangkok. Data from the Cambodia Mine Action Centre, which estimates there are still 4 to 6 million landmines scattered across the country, shows five people were killed and a dozen injured by mines and unexploded ordnance in Cambodia in the first four months of 2025. The area where the mine exploded is near where a Cambodian soldier was killed in May after a brief exchange of gunfire between troops on both sides. The incident has flared into a broader diplomatic dispute between the Southeast Asian neighbours that has destabilised the Thai government and seen the Prime Minister suspended from office. Thailand said it will issue a formal condemnation and call for accountability from Cambodia for breaching the anti-landmine convention under the Ottawa Treaty, and the army will also increase vigilance during border patrols. Solve the daily Crossword


Bloomberg
6 hours ago
- Bloomberg
Thailand Claims Cambodia Planted Land Mines, Escalating Dispute
Thailand accused Cambodia of planting new land mines on the Thai side of the shared border, in an escalation of a bitter territorial dispute between the two countries. Three Thai soldiers were injured when they stepped on a land mine during a routine patrol along an established route within Thai territory on July 16, the Ministry of Foreign Affairs said in a statement late Sunday. The mines were not of a type used by Thailand and were recently laid in a 'blatant violation of international law,' it said.