logo
WeChat used in Johor drug network, RM1.23mil in seizures

WeChat used in Johor drug network, RM1.23mil in seizures

JOHOR BARU: A WeChat-based drug trafficking syndicate operating from gated residences in Johor was dismantled following a two-day special operation by the state Narcotics Criminal Investigation Department (NCID) on May 20 and 21.
Johor police chief Datuk M. Kumar said the first raid at 3.30pm led to the arrest of a 32-year-old man and a 29-year-old Vietnamese woman inside a Nissan X-Trail at the lobby of a guarded apartment along Jalan Skudai Lama.
Police found packets of drugs, including syabu, ketamine, and Erimin 5 pills, in the vehicle.
The male suspect, who has a criminal record, had rented the apartment unit.
A follow-up raid at a guarded terrace house in the district resulted in the arrest of five more suspects — four men and a Myanmar woman — aged between 29 and 54.
He said the second location was used as a drug storage hub, with police seizing over RM1.23 million worth of narcotics, including 7.08kg of ecstasy powder, 1.37kg of heroin, 139g of ketamine, 123g of syabu, and 127 Erimin 5 pills.
Police also confiscated three vehicles, two motorcycles, RM9,320 in cash, and jewellery worth RM32,453.20.
"The syndicate, active since January, used WeChat to coordinate transactions with long-time clients.
"Buyers and suppliers would use the app to agree on drop-off points, where drugs and cash were exchanged anonymously. The locations changed constantly and were only shared with trusted contacts," Kumar said at a press conference today.
All seven suspects have been remanded until June 2.
The case is being investigated under Section 39B of the Dangerous Drugs Act 1952.
The Myanmar woman is also being investigated under Section 6(1)(c) of the Immigration Act 1959/63 for lacking valid travel documents.
In a separate operation in Pontian on May 21, police arrested a 35-year-old man suspected of drug distribution.
The man, who tested positive for methamphetamine, was caught at a rented terrace house at 6pm.
Police seized 6.4kg of ecstasy powder, 5.66g of ketamine, 20.04g of syabu, 76 ecstasy pills, and eight yaba pills worth RM1.07 million — enough for an estimated 21,559 addicts.
Police also seized RM600 from the suspect, who has been remanded until June 2.
Investigations are underway to track down other members of the syndicate.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

This is the phishing scam that gets an identity theft expert in the US 'really, very angry'
This is the phishing scam that gets an identity theft expert in the US 'really, very angry'

The Star

time13 hours ago

  • The Star

This is the phishing scam that gets an identity theft expert in the US 'really, very angry'

Digital thieves are nothing if not persistent and innovative. They keep finding new ways to try to part you from your money. Phishing – where thieves pose as trusted entities or send legitimate looking emails or messages to trick you into giving them access to your accounts – is a widespread method. And it is constantly evolving. 'We've seen phishing go through the roof,' said Eva Velasquez, the CEO of the Identity Theft Resource Center, a San Diego-based national nonprofit. But knowledge is power. So here are three emerging phishing threats to look out for, according to Internet safety experts. All three threats target key parts of people's digital lives: email attachments that lead to fake login pages, multi-factor authentication trickery and deceptive calendar invites. Spending a few minutes reading these pointers could help you avoid getting your ID or money stolen and save you countless hours of dealing with the fallout. HTML attachments that open fake login pages Imagine a busy professional who is in email action mode. In the past 30 minutes on a Saturday morning, he has filled out emailed liability waivers for his seven children's summer camps, filed an expense report for work, answered a secure portal message from the veterinarian about his sick puppy's prescription, skimmed 182 email subject lines and paid five bills from his email inbox, including a car insurance premium and his beloved cheese-of-the-month club. Amid this flurry of inbound emails, ads, invoices and secure messages, he is working on autopilot: opening messages, skimming, clicking and signing in. What a perfect opportunity. Scammers are taking advantage of user distraction – and their trust – by sending emails with HTM or HTML attachments. When clicked, those open a browser file that looks like secure, familiar login page. These pages might look like secure invoice viewers, file-sharing services like DocuSign or Dropbox, or sign-in pages to platforms including Microsoft 365. 'Once the user enters their credentials, they are sent surreptitiously to the attacker's server,' said Vlad Cristescu, the head of cybersecurity with ZeroBounce, a Florida company that helps businesses lower their rate of bounced marketing emails. Why this method is especially insidious: 'There isn't a clickable link in the email, so standard email security filters (which scan for malicious URLs or attachments like PDFs and ZIPs) may not catch it,' Cristescu added. To prevent this, he added, companies should 'restrict HTML attachments unless essential, and users should treat unfamiliar HTML files the same way they'd treat a suspicious link – don't open it unless you're absolutely sure of the sender.' If you do receive incoming communication with an HTML link or attachment, don't engage, said Velasquez, with the ITRC. 'Don't click on links, people. That's the big, overarching message,' she said. Instead, go to the source: call the phone number on the back of your credit card, visit the bank in person. Multifactor authentication tricks If you are one of the many people who uses multifactor authentication, take note. Multifactor authentication is still very helpful and should be used. But Cristescu flagged one way that scammers are taking this tool – which is designed to make people's online accounts more secure – and using it to slither in. As a refresher, multifactor authentication is an added layer of protection that prevents data thieves from logging into your accounts if they have your username and password. It helps ensure that you're the one who typed in your password when you log in, and not some scammer in the Philippines or Poughkeepsie. To use multifactor authentication, you typically download an app, such as Google Authenticator or Microsoft Authenticator. You register your sensitive online accounts, such as Facebook, bank or email, with that app. Then, every time you log into a registered website, the authenticator app generates a new, random code that you enter after your password as a second layer of verification. With the rise of this protection, a new threat has emerged: Scammers who have your username and password can send log-in requests to your authenticator app. Next, the scammer can pose as an IT expert from your workplace and ask you to approve the log-in request. If you fall for it, then boom – the scammer is in. This technique 'exploits a user's frustration and trust in IT. If you're receiving multiple (authenticator) prompts you didn't initiate, that's not a glitch – it's an attack,' Cristescu said. He recommends pausing, never approving these unexpected requests and flagging the interaction with IT. Velasquez added that if you get an authenticator notification and you didn't just log in yourself, 'That is a huge red flag. Stop and address it. Don't ignore it.' Anytime you interact with IT, be sure you're the one initiating that contact, she added. If someone from IT calls or emails you, disconnect and reach back out using a trusted method, such as the same phone number you always dial. Fake calendar invites A third technique data thieves are using is calendar invites. 'I just get really very angry about this one,' Velasquez said. 'It is super hard to detect.' Here's what to look out for. If you use an online calendar like Google calendar or the native iPhone calendar app, you might receive an invitation to an event you didn't see coming. Sometimes these meetings are legitimate. Sometimes, they are not. Scammers 'are now sending meeting requests with malicious links embedded in the invite or 'join' button. These invitations sync directly into calendars and often go unquestioned,' according to ZeroBounce. Scammers use calendar invites because they have 'built-in credibility – they're not usually scrutinised like emails,' Cristescu said. Look for meeting requests from unknown senders and vague event names like 'Sync' or 'Project Review,' he added. In some jobs or roles, meetings routinely get added to calendars by other people –clients, prospects, coworkers, bosses, peers. 'I have gotten these repeatedly,' said Velasquez, with the ITRC. 'Depending on your lifestyle and your job and how you work, these are going to be particularly challenging. They are real calendar invites. The problem is they have malicious software embedded in them – so when you click on portions of them, 'Click to join,' it's like opening an attachment (or) clicking on a suspicious link. It's the same principle.' Cristescu, with ZeroBounce, shared this tip: 'Treat those just like a phishing email. Disable auto-accept where possible and review every invite manually before clicking anything.' Never stop questioning what lands in your inbox or calendar, Cristescu added. 'Always verify the sender's email address, ensure that any link you click matches the legitimate domain, and look out for subtle red flags like spelling errors or unusual formatting.' A big picture pointer 'All three of these (scams) are so common that it has probably happened to every single person reading the article – at least one of them. That's how ubiquitous these are,' Velasquez said. She shared this broader thought: It's less important to know how to respond to each scenario and more important to pause, be skeptical, double check. It's important to be ever more sceptical, because AI makes it easier and easier for thieves to create convincing ruses, Cristescu and Velasquez both said. AI 'really helps with making these phishing offers look and sound so much more legitimate,' Velasquez said. 'And with the amount of data that is out there from public sources and from data breaches, it's very easy to see what relationships people have.' Where you bank, where you do business – that is all fodder for someone to create a copycat page designed to trick you into logging in. Adopt an 'investigator mindset,' Velasquez said. Use this helpful reminder: the acronym STAR, which stands for Stop. Think. Ask questions or ask for help. Reassess. – The San Diego Union-Tribune/Tribune News Service

Assad-era political prisoner wants justice
Assad-era political prisoner wants justice

New Straits Times

time2 days ago

  • New Straits Times

Assad-era political prisoner wants justice

SYRIAN fighter pilot Ragheed Tatari was 26 when he was arrested. Now 70, the country's longest-serving political prisoner is finally free after Bashar al-Assad's fall, seeking justice and accountability. Tatari, arrested in 1981 and sentenced to life behind bars, was among scores of prisoners who walked free when longtime ruler Assad was overthrown on Dec 8. He has made it out alive after 43 years in jail, but tens of thousands of Syrian families are still searching for their loved ones who disappeared long ago in Syria's hellish prison system. "I came close to death under torture," said Tatari in his small Damascus apartment. Since a military field court gave him a life sentence for "collaborating with foreign countries" — an accusation he denies — Tatari was moved from one prison to another, first under late president Hafez al-Assad and then his son Bashar who succeeded him in 2000. Showing old pictures of him in his pilot uniform, Tatari said he was not seeking revenge, but stressed that "everyone must be held accountable for their crimes". More than two million Syrians were jailed under the Assad dynasty's rule, half of them after anti-government protests in 2011 escalated into civil war, according to the Syrian Observatory for Human Rights monitor. The Britain-based monitor says around 200,000 died in custody. Diab Serriya, co-founder of the Association of Detainees and Missing Persons of Saydnaya Prison, said Tatari was "the longest-serving political prisoner in Syria and the Middle East". Rights group Amnesty International has called the notorious Saydnaya prison outside Damascus a "human slaughterhouse". Tatari had been detained there, but he said his 15 years in the Palmyra prison in the Syrian desert were the most difficult. The Palmyra facility operated "without any discipline, any laws and any humanity", said Tatari. Detainees were "not afraid of torture — we wished for death", he added. "Everything that has been said about torture in Palmyra... is an understatement. A guard could kill a prisoner if he was displeased with him," said Tatari. In 1980, Palmyra witnessed a massacre of hundreds detainees, gunned down by helicopters or executed in their cells after a failed assassination attempt on Hafez al-Assad. Tatari said he was completely disconnected from the outside world there, only learning of the fall of the Berlin Wall and the collapse of the Soviet Union through a prisoner who had returned from a hospital visit. In Sweida prison in the south, where Tatari was transferred after the 2011 revolt began, some inmates had phones that they would keep hidden from the guards. "The cell phone gets you out of prison, it makes you feel alive," he said, recalling how he used to conceal his device in a hole dug in his cell. But after his phone was discovered, he was transferred to a prison in Tartus — his final detention facility before gaining freedom. Tatari was one of several military officers who were opposed to Syria's intervention in Lebanon in 1976, and to the violent repression in the early 1980s of the Muslim Brotherhood, Syria's main opposition force at the time. After two of his fellow pilots defected and fled to Jordan in 1980, he escaped to Egypt and then on to Jordan. But he returned when security forces began harassing his family and was arrested on arrival. His wife was pregnant at the time with their first and only son. For years, the family assumed Tatari was dead, before receiving a proof of life in 1997. It was then that Tatari was finally able to meet his son, then aged 16, under the watchful eye of guards during the family's first authorised prison visit that year. His wife has since died and their son left Syria, having received threats at the start of the protest movement, which had spiralled into war and eventually led to Assad's overthrow.

Cops bust lab producing drug-laced vape liquid, 2 Taiwanese arrested
Cops bust lab producing drug-laced vape liquid, 2 Taiwanese arrested

Free Malaysia Today

time2 days ago

  • Free Malaysia Today

Cops bust lab producing drug-laced vape liquid, 2 Taiwanese arrested

Bukit Aman NCID acting director Salahuddin Che Ali (centre) said the syndicate used condominiums with complete security to process and package the illicit substances. (Bernama pic) PETALING JAYA : Two Taiwanese nationals operating a laboratory processing drug-laced vape liquid in Kuala Lumpur were arrested on Wednesday, say police. Bukit Aman narcotics criminal investigation department (NCID) acting director Mat Zani @ Salahuddin Che Ali said they also seized drugs worth RM3.29 million during a raid on a condominium in Brickfields, Bernama reported. He said in the raid at 10.30pm, police found 20 five-litre plastic containers (jelly cans) and six 0.5-litre plastic bottles containing amphetamine vape liquid. In addition, police also found various types of equipment for processing drug-laced vape liquid, such as a mixer, heating machine, weighing scale, sealing machine, three glass beakers, one plastic funnel, and 95 empty cartridges believed to be for filling the drug-laced vape liquid. 'Initial technical analysis found that this syndicate is believed to be processing vape liquid containing amphetamine (fluoroamphetamine, paramethoxyamphetamine) which has psychoactive and toxic effects similar to the drug ecstasy on its users. 'The adverse effects of consumption include seizures, liver failure, extreme body temperature, psychosis, brain damage, emotional disturbances, extreme addiction, and even sudden death due to heart attack or respiratory failure,' he was quoted as saying during a press conference at the federal police headquarters in Kuala Lumpur today. Salahuddin said both suspects, aged 30 and 35, served as chemists and obtained the ingredients for the drug from China. He said that to ensure their drug-laced vape liquid processing activities were not detected, the syndicate used condominiums with complete security to process and package the illicit substances. 'This premise was rented at RM4,100 per month, and it is believed that they change processing locations every three months, bringing in chemists from Taiwan and recruiting local workers to mislead the authorities. 'Both suspects also played a role in guarding the vape liquid processing site and delivering the drugs to customers. They entered our country using a social visit pass and had entered the country twice, at the beginning of this year and early this month,' he said. He stated that the amphetamine drug-laced vape liquid was sold to the local market at RM180 per cartridge and internationally at around RM400 per cartridge. Salahuddin said urine screening tests found both suspects negative for drugs but they were found to have a criminal record in their home country. 'We have checked the criminal records of both suspects through our cooperation with Taiwan's ministry of justice investigation bureau and criminal investigation bureau to trace their past records and assist in the full investigation of this case. 'The results revealed that the first suspect had previously driven under the influence of alcohol and drugs, while the second suspect has a criminal record involving various cases, including murder, drug trafficking, and firearms,' he said, according to Bernama. The case is being investigated under Section 39B of the Dangerous Drugs Act 1952. Salahuddin said action is also being taken under the Dangerous Drugs (Forfeiture of Property) Act 1988, with the seizure of a Honda AFS125 motorcycle belonging to the first suspect, valued at RM7,000.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store