Netcrook Logo
👤 AUDITWOLF
🗓️ 03 Mar 2026  

Inside Project Compass: How Global Police Are Cracking Down on 'The Com' Hacker Collective

A sweeping international operation targets a shadowy network of young cybercriminals accused of hacking, extortion, and extremist violence.

In the early hours of a cold January morning, coordinated raids across multiple continents led to the arrest of 30 alleged members of “The Com” - a sprawling, loosely organized collective of young hackers. The crackdown, part of the secretive “Project Compass,” marks one of the boldest international efforts yet to dismantle a cybercriminal ecosystem that has thrived in the shadows of the internet, recruiting teenagers and exploiting digital communities where they feel safest.

The Anatomy of a Digital Crimewave

For years, “The Com” - short for “The Community” - has haunted cyber investigators. Composed mainly of English-speaking youths aged 13 to 25, the group operates through sub-groups such as Scattered Spider and Scattered Lapsus$ Hunters. Their activities range from ransomware attacks on major enterprises to online extortion and even orchestrating real-world violence. Europol describes The Com as an “extremist network” that deliberately seeks out and radicalizes vulnerable minors across platforms like gaming forums, messaging apps, and music streaming services.

What makes The Com especially elusive is its decentralized structure. Unlike traditional criminal syndicates, its members rarely meet in person, relying instead on the anonymity and reach of the internet. This has made it challenging for law enforcement to track, infiltrate, and disrupt their operations - until now. Project Compass, launched in January 2025, represents an unprecedented level of international cooperation, bringing together counter-terrorism units, cybercrime experts, and child exploitation investigators from 28 countries.

From Hacking to Harm: The Dark Side of Recruitment

Europol’s findings paint a disturbing picture. Sub-groups like “764” are infamous for grooming minors, coercing them into creating explicit content or even committing violent acts. The material is then used for blackmail, further entrenching victims in cycles of abuse. Other factions focus on hacking enterprises, breaching sensitive databases, and launching ransomware campaigns - sometimes simultaneously targeting both the digital and physical worlds.

Despite high-profile arrests in recent years, The Com’s decentralized nature has allowed it to absorb losses and continue its operations. The group’s adaptability and reach have kept it at the forefront of cybercrime headlines, with attacks on airlines and major tech companies reported as recently as early 2025.

Is the Net Closing?

Project Compass’s early results - 30 arrests and dozens of victims identified - are significant but may only scratch the surface. Europol has pledged to continue the operation, emphasizing the need for global intelligence-sharing and specialized task forces to combat a threat that knows no borders. As police close in, The Com’s future remains uncertain, but the message is clear: the digital underworld is no longer untouchable.

WIKICROOK

  • Decentralized structure: A decentralized structure spreads control and operations across multiple entities, enhancing cybersecurity by reducing single points of failure and improving resilience.
  • Ransomware: Ransomware is malicious software that encrypts or locks data, demanding payment from victims to restore access to their files or systems.
  • CSAM (Child Sexual Abuse Material): CSAM stands for Child Sexual Abuse Material - illegal content depicting the sexual exploitation or abuse of minors, and a serious global cybercrime.
  • Radicalization: Radicalization is persuading individuals, often online, to adopt extremist beliefs or behaviors, posing significant cybersecurity and societal risks.
  • Extortion: Extortion in cybersecurity is when attackers demand money or favors by threatening to release harmful online content or sensitive data unless their demands are met.
Project Compass The Com Cybercrime

AUDITWOLF AUDITWOLF
Cyber Audit Commander
← Back to news