How the RCMP Took Down Prolific Cyber Fraudsters

RCMP, Cyber Fraudsters

In February 2025, the RCMP’s Cybercrime Investigative Team (CIT) in Ontario achieved a significant bust of two Toronto-based suspects who allegedly defrauded hundreds of Canadians out of millions of dollars. grc.gc.ca+2newswire.ca+2

Although this case is primarily a law-enforcement story, it holds important lessons for MSPs/MSSPs, cyber-defence providers and businesses (including ours at TeckPath) about threat modelling, impersonation fraud, collaboration, and why “absence” of controls can be as telling as the presence of the attacker.

The Operation Overview

  • The suspects, a Toronto couple, are accused of using technology to mask their caller identity, posing as banks, governments or police to trick victims into handing over money or sensitive credentials. newswire.ca+1

  • They leveraged a website called iSpoof.cc, which allowed users (reportedly up to 38,000 globally) to make unauthorized calls while displaying forged caller IDs. The couple were believed to be in the top 50 most active subscribers of this service. grc.gc.ca+1

  • The RCMP conducted search warrants at their residence, seized devices and are analysing them to uncover further evidence. At the time of the announcement, at least 570 victims had been identified. newswire.ca+1

  • The charges included fraud (Criminal Code s. 380(1)), unauthorized use of computer (s. 342.1), laundering proceeds of crime (s. 462.31), unauthorized possession of credit card data (s. 430(1.1)), and possessing proceeds of crime (s. 354). newswire.ca+1

  • Importantly, the RCMP credited cooperation with domestic and international partners (including London Metropolitan Police, Dutch National Police, EUROPOL, EUROJUST, FINTRAC and others) as a key enabler of the disruption. grc.gc.ca+1

Why This Matters for Cyber-Defence & MSPs

  1. Spoofing & impersonation are still highly effective
    The attackers used a relatively low-tech method (caller ID spoofing) but within a high-risk social-engineering context. For IT service providers and clients, this reinforces that phishing, vishing (voice-phishing) and smishing remain major threat vectors — and that detection and prevention must go beyond just email spam filters.

  2. Criminals exploit “absence” of verification and context
    From our vantage at TeckPath, one way to frame this: the absence of robust caller verification, the absence of employee training on “if you get a call from your bank/police/government, verify independently” and the absence of layered controls enabled the fraud. It’s not just the presence of an attacker, but the absence of appropriate internal controls, sonic validation procedures, and layered defences that matters.

    This ties into a deeper leadership and service theme: in cybersecurity, what’s missing (controls not configured, processes not followed, signals not monitored) can be more telling than what is present.

  3. Data seizure & forensic readiness matter
    The RCMP seized devices and are analysing them — meaning the attackers left digital footprints. For MSPs, prepping for incident readiness means ensuring clients have logs, backups, device-imaging, endpoint detection, and chain of custody in place. If a breach occurs, readiness accelerates the investigation and remediation.

  4. Collaboration across jurisdictions and stakeholders amplifies impact
    This case shows that cyber-fraud often spans borders and jurisdictions; the RCMP relied on international agencies and financial intelligence (FINTRAC). For companies like ours serving clients in multiple sectors and geographies, understanding that threat actors may exploit cross-border weak points (e.g., call-spoof services outside Canada) is essential.

  5. Victim impact is real — reputational & operational risk
    Although this case involved consumer victims, similar fraud tactics can target businesses, suppliers or employees. For MSPs we support small to mid-sized enterprises, helping clients appreciate that fraud is not just financial loss—it’s business disruption, regulatory risk, reputational damage, and client trust erosion.

Lessons TeckPath & Our Clients Should Emphasize

  • Train employees and clients on voice-based scam awareness: Ensure awareness that calls claiming to be from “the bank” or “government” might be spoofed—require independent verification via known contact methods.

  • Implement and test multi-factor authentication (MFA) and identity assurance: When caller IDs and sender addresses can be faked, identity assurance is crucial.

  • Monitor and log anomalous call volumes or spoof-service usage: Even MSPs can help clients monitor for unusual communications patterns, including unexpected external call subscriptions or data exfiltration.

  • Ensure incident response and forensic readiness: Logs, device imaging, chain-of‐custody protocols, and vendor/partner coordination should be part of a service offering.

  • Leverage ecosystem and intelligence sharing: Just as the RCMP brought in international partners and financial intelligence, MSPs/MSSPs should bring intelligence feeds, partner networks, and threat-sharing mechanisms into their service stack.

  • Frame absence of control as the threat vector: In our leadership narrative (and service delivery narrative), we can speak to how “what’s missing” — policies, visibility, communication channels — often enables threat actors more than the attacker’s sophistication.

Final Thoughts

While clients often focus on malware, ransomware, open vulnerabilities, and headline attacks, this case underscores that social engineering and identity-based spoofing remain potent. The RCMP’s success reminds us that attacker tools may not always be exotic—they may exploit simple but robustly deployed services (like spoofing subscriptions) in creative ways.

For TeckPath, as we continue to scale our MSP/MSSP services and pursue SOC 2 Type 2 compliance (which we achieved), and as we support clients expanding in Canada and beyond, this case reinforces why our people-first, process-first, control-first culture matters. It’s not just about the presence of “defences” but ensuring that nothing critical is absent

The absence of vigilance, training, verification, layered control is what enables success for attackers.

TeckPath News

Related Articles

Contact us

We are fully invested in every one of our customers.!

Our focus has always been to be your strategic partner. This approach has helped develop a reliable and tangible process in meeting our client’s needs today and beyond.

Our dedicated team is here to support businesses from 1 – 200+ users starting today.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2
We do a discovery and consulting meeting
3

We prepare a proposal 

Schedule a Free Consultation