Introduction: A perspective on the dispersed battle against cybercrime The growing sophistication and diversification of cybercrime have compelled law enforcement agencies worldwide to respond through increasingly coordinated and publicized actions This article explores cybercrimes committed. . However, to the best of our knowledge, there is still no thorough picture of how law enforcement is combating cybercrime worldwide, despite the visibility of these operations. Publicly accessible data is scattered across agencies, jurisdictions, case-specific reporting (such as "Operation Endgame")[1], and reporting formats, providing fragmented insights rather than a coherent understanding of the kinds of crimes being targeted, the actions taken, and the identities of the offenders. Instead of a coherent global picture, this leads to isolated glimpses. As a result, we are not aware of any publicly accessible summary that methodically compiles data on law enforcement actions.

πŸ”— Get Your Copy Now While financial gain remains a central driver of cyber offenses[2,3,4], the lines between motivations have become increasingly blurred, in some cases shifting in response to geopolitical events, as we have continuously been reporting on in the past two years[5,6]. Activities initially framed as financially motivated can quickly take on political or ideological dimensions. These fluid boundaries illustrate how financial, political, and cognitive motives increasingly coexist, challenging traditional distinctions between criminal and ideological cyber activity.

What Actions Were taken by Law Enforcement? Actions like investigations, wanted notices, and extraditions demonstrate cross-border cooperation and the procedural depth behind each publicized enforcement effort. It is noteworthy that some age groups are represented by very few cases, limiting possible interpretation.

The 35–44 age group makes up 37% of our dataset (n=193 offenders with verified age data), followed by the 25–34 age group (30%) and the 18–24 age group (21%), which together account for nearly 90% of all identified offenders. In contrast, statistical analysis of the younger (12–17 years old) and older (55 years and older) groups is less significant because they each make up less than 5% of the cases. It is noteworthy that younger offenders are probably underrepresented, particularly when it comes to those aged 12 to 17.

This is because minors are frequently protected from prosecution and public disclosure under national legal frameworks, which limits their visibility in law enforcement reporting. Because of this, we will mainly concentrate on the three core age groups (18–24, 25–34, and 35–44 years), which have the highest rates of offender representation.

According to age data, the majority of cybercrimes are committed by adults in their mid-20s to mid-40s, with relatively few cases involving younger or older people. These age groups differ in the types of offenses they commit; younger offenders are more likely to be involved in technical and exploratory activities like hacking and DDoS attacks, while older cohorts are more likely to be involved in complex or profit-driven operations like data theft, cyber extortion, and malware deployment. Russian nationals alone account for almost 25% of cases, according to nationality data, which demonstrates a strong concentration within a few groups.

Nationality offers valuable insight into the sociopolitical and regional contexts in which offenders operate, even though it cannot fully explain the origins of cybercrime in an interconnected digital space.

Extortion and ransomware, cyber-enabled financial crime, and unauthorized access are among the criminal acts that are most commonly prosecuted, indicating that the majority of cybercriminal activity is still driven primarily by financial gain.