Swedish Police Arrest 14 in Flugsvamp 2.0 Case

After seizing Flugsvamp 2.0, law enforcement in Sweden announced the identification “many” of the marketplace’s 17,600 users. Swedish authorities have already arrested some of those users, according to a recent press release. Both buyers and sellers are currently under investigation.

The Flugsvamp 2.0 seizure banner

The Flugsvamp 2.0 seizure banner

On February 12, law enforcement in Sweden announced the seizure of Flugsvamp 2.0. The Flugsvamp 2.0 investigation–called Operation Incognito 2–involved support from law enforcement in more than 25 countries and has been running for two years now. During the investigation, Swedish authorities successfully identified “many” of the market’s 17,000 customers and 600 vendors. Police have now arrested 14 suspects in connection with the case for alleged drug or money laundering crimes.

Authorities arrested the market’s administrator in September 2018 but only recently started arresting users of the market. The announcement covering the arrests revealed very little information about the arrests or about Operation Incognito 2. It did emphasize that even buyers were a target for investigators. Police are currently analyzing data from the seized Flugsvamp 2.0 server(s) in “hopes of being able to identify more buyers and sellers.”
“Today, there are tools and methods for identifying people who commit crimes on the darknet. You cannot be anonymous,” one official said.

Björn Eriksson, detective inspector at the National Cybercrime Centre and the person in charge of the investigation:

“Many people think that darknet is a hidden part of the internet where crimes can be committed anonymously and with impunity. They are completely wrong. We have developed our capabilities, and you cannot feel secure on hidden sites even when the criminal schemes are very advanced.”

There is a post on Dread by /u/GuidedByVices titled “Discussion: OpSec Lessons from the Flugsvamp 2.0 Bust” that covers some of the interesting elements of the investigation. It builds off documents hosted by Gwern. (And here is the full size seizure banner.)

Do you really want to comment here? not rules
309e9f80 Fri, Feb 28, 2020

so they got the private key then? lmao

also fuck off with dread shit, as far as I am concerned compromised since day one. u want to be taken seriously dnl? separate yourself from bughunter


ecd5d370 Fri, Feb 28, 2020

What makes you suspect this? This sounds like something the feds would do but there is some contradictory evidence against this claim, such as when hug’s dead man switch activated. Why would they create a massive fud campaign against themselves it makes no sense, but there could always be a reason behind it we never know.

047ba5d0 Fri, Feb 28, 2020

Makes one wonder.
Sweden a country heavily plagues by migration, extreme violence in the matter on a daily base. Spending their LE power rather on some online drug trading AkA being coin horny for the market.
Fuck the law
Fuck noobs without good opsec.

8759f0d0 Fri, Feb 28, 2020

Has anyone considered that maybe they figured out a way to break encryption? I did an article on quantum computing awhile back that was deleted on Dread. Kind of makes me wonder if they’re waiting to get the most market users on all darkweb market web places and chip away little by little and entrap everyone at the “height” of everything. I’m not saying it’s actually taking place or “happening” but isn’t it plausible?

I suggested in my article that vendors should make a seperate key in binary code that corresponds to a number in the alphabet that can be changed or updated frequently; that way users buying would still be safe if encryption was broken as long as the vendors key was updated. Someone would just have to develop the software on a secure operating system that could run it so its not so tedious to update all the time, but it was taken off of Dread.

d041bf10 Fri, Feb 28, 2020

I think the reason they use Dread is cause it is the only forum you don’t need to register to view posts on. I feel like all this Hug and Paris are Feds is just FUD.

c0fe6ca0 Fri, Feb 28, 2020

Enigma, I’d like to read that article. Can you upload it somewhere else?

478e17b0 Sat, Feb 29, 2020

If anyone in the world was capable of breaking RSA, the US government would be the first. And I highly doubt they would share that information with foreign intelligence, especially for “mere” DNMs.

Assuming the market didn’t enforce PGP, catching vendors/buyers would be as simple as looking up the shipping records stored in plaintext.

This is assuming they had the whole server imaged without encryption in the first place, which seems to have been the case.

47f0c7c0 Sat, Feb 29, 2020

I find it hilarious how they keep trying to convince us tor is easy to deanon when they are likely just tracing BTC or other methods lol they don’t have the resources to deal with every hidden service and that’s why they desperately repeat themselves that YOU ARE NOT ANON spooky spooky.

f7520c80 Wed, Mar 4, 2020

most likely just blockchain analysis and unecrypted address tracing.

18606770 Thu, Mar 5, 2020

“We have developed our capabilities, and you cannot feel secure on hidden sites even when the criminal schemes are very advanced.” They’re not lying, but what they’re actually saying is that they developed such level of shilling and fudding that the majority does not feel secure. But that’s about having their deposit processed. Nobody gives a fuck about your 0.000005% arrest rates. Low hanging fruit is what you get.

New comments are disabled after ten days in an attempt to limit spam.