Swedish Police Arrest 14 in Flugsvamp 2.0 Case

~2 min read | Published on 2020-02-27, tagged ArrestedDarkweb-Market using 296 words.

After seizing Flugsvamp 2.0, law enforcement in Sweden announced the identification “many” of the marketplace’s 17,600 users. Swedish authorities have already arrested some of those users, according to a recent press release. Both buyers and sellers are currently under investigation.

On February 12, law enforcement in Sweden announced the seizure of Flugsvamp 2.0. The Flugsvamp 2.0 investigation–called Operation Incognito 2–involved support from law enforcement in more than 25 countries and has been running for two years now. During the investigation, Swedish authorities successfully identified “many” of the market’s 17,000 customers and 600 vendors. Police have now arrested 14 suspects in connection with the case for alleged drug or money laundering crimes.

Authorities arrested the market’s administrator in September 2018 but only recently started arresting users of the market. The announcement covering the arrests revealed very little information about the arrests or about Operation Incognito 2. It did emphasize that even buyers were a target for investigators. Police are currently analyzing data from the seized Flugsvamp 2.0 server(s) in “hopes of being able to identify more buyers and sellers.”
“Today, there are tools and methods for identifying people who commit crimes on the darknet. You cannot be anonymous,” one official said.
Björn Eriksson, detective inspector at the National Cybercrime Centre and the person in charge of the investigation:
“Many people think that darknet is a hidden part of the internet where crimes can be committed anonymously and with impunity. They are completely wrong. We have developed our capabilities, and you cannot feel secure on hidden sites even when the criminal schemes are very advanced.”

There is a post on Dread by /u/GuidedByVices titled “Discussion: OpSec Lessons from the Flugsvamp 2.0 Bust” that covers some of the interesting elements of the investigation. It builds off documents hosted by Gwern. (And here is the

Comments (11)


so they got the private key then? lmao also fuck off with dread shit, as far as I am concerned compromised since day one. u want to be taken seriously dnl? separate yourself from bughunter and VENDY RULES MONOPOLY is a fool

random e girl2020-02-28

What makes you suspect this? This sounds like something the feds would do but there is some contradictory evidence against this claim, such as when hug's dead man switch activated. Why would they create a massive fud campaign against themselves it makes no sense, but there could always be a reason behind it we never know.


Makes one wonder. Sweden a country heavily plagues by migration, extreme violence in the matter on a daily base. Spending their LE power rather on some online drug trading AkA being coin horny for the market. Fuck the law Fuck noobs without good opsec.


Has anyone considered that maybe they figured out a way to break encryption? I did an article on quantum computing awhile back that was deleted on Dread. Kind of makes me wonder if they're waiting to get the most market users on all darkweb market web places and chip away little by little and entrap everyone at the "height" of everything. I'm not saying it's actually taking place or "happening" but isn't it plausible? I suggested in my article that vendors should make a seperate key in binary code that corresponds to a number in the alphabet that can be changed or updated frequently; that way users buying would still be safe if encryption was broken as long as the vendors key was updated. Someone would just have to develop the software on a secure operating system that could run it so its not so tedious to update all the time, but it was taken off of Dread.


I think the reason they use Dread is cause it is the only forum you don't need to register to view posts on. I feel like all this Hug and Paris are Feds is just FUD.


Enigma, I'd like to read that article. Can you upload it somewhere else?

probably not2020-03-01

If anyone in the world was capable of breaking RSA, the US government would be the first. And I highly doubt they would share that information with foreign intelligence, especially for "mere" DNMs. Assuming the market didn't enforce PGP, catching vendors/buyers would be as simple as looking up the shipping records stored in plaintext. This is assuming they had the whole server imaged without encryption in the first place, which seems to have been the case.


I find it hilarious how they keep trying to convince us tor is easy to deanon when they are likely just tracing BTC or other methods lol they don't have the resources to deal with every hidden service and that's why they desperately repeat themselves that YOU ARE NOT ANON spooky spooky.




most likely just blockchain analysis and unecrypted address tracing.

They're not lying2020-03-05

“We have developed our capabilities, and you cannot feel secure on hidden sites even when the criminal schemes are very advanced.” They're not lying, but what they're actually saying is that they developed such level of shilling and fudding that the majority does not feel secure. But that's about having their deposit processed. Nobody gives a fuck about your 0.000005\% arrest rates. Low hanging fruit is what you get.