EncroChat was an encrypted communications network used primarily by organised crime groups across Europe, and it was dismantled in 2020 after French and Dutch authorities successfully hacked its system, leading to thousands of arrests and convictions worldwide. The platform sold modified Android phones with encrypted messaging features, promising anonymity and security for a subscription fee of around €1,000 to €1,500 for six months. In reality, law enforcement infiltrated the system, captured millions of messages in real time, and passed intelligence to agencies including the UK’s National Crime Agency. This article explains what EncroChat was, how it worked, how it was hacked, who used it, and what happened after the breach. You will also learn about key trials, legal challenges, costs, technical details, and the wider impact on encrypted communications and organised crime.

What Was EncroChat?

EncroChat was a subscription-based encrypted phone service that operated between roughly 2016 and June 2020, marketing itself as a secure communications provider. It supplied customised Android handsets, often rebranded devices such as the BQ Aquaris X2, stripped of standard functions and loaded with encryption software. The company was believed to be registered in Europe, with servers later traced to France.

The service was not openly advertised to the public. Instead, it was distributed through resellers and word-of-mouth networks, particularly among organised crime groups involved in drug trafficking, firearms supply, money laundering, and violent offences. At its peak, investigators estimated around 60,000 users worldwide, with approximately 10,000 in the UK alone.

EncroChat phones did not function like normal smartphones. They lacked standard calling features and focused almost entirely on encrypted messaging. A dual operating system allowed users to switch between a normal-looking interface and a hidden encrypted system, accessible via a PIN.

How EncroChat Phones Worked

EncroChat devices included end-to-end encrypted messaging, secure voice calls, and a “panic wipe” feature that erased data instantly if a user entered a specific code. Messages were routed through overseas servers and automatically deleted after a set period. Users could not install regular apps, reducing the risk of malware or tracking.

Each handset had its camera, microphone, and GPS removed or disabled in some versions. The goal was to minimise digital footprints. Subscribers paid around €1,500 per year, usually in cryptocurrency or cash, to maintain access to the network and regular security updates.

Law enforcement later described the platform as “a criminal marketplace in your pocket.” Messages captured during the hack revealed detailed discussions of cocaine imports through ports such as Rotterdam and Antwerp, firearms shipments, kidnapping plots, and even contract killings.

Who Used EncroChat?

EncroChat was widely used by organised crime networks across the UK, France, the Netherlands, Germany, Sweden, Spain, and beyond. In the UK, the National Crime Agency linked users to large-scale drug trafficking operations involving Class A drugs, including cocaine and heroin, often imported via container ports.

European authorities discovered that major drug cartels relied on EncroChat to coordinate shipments from South America into Europe. In some cases, users discussed logistics down to specific container numbers, shipping schedules, and warehouse locations. Firearms deals, including automatic weapons and ammunition, were also negotiated on the platform.

EncroChat was not limited to drug gangs. Investigations revealed involvement in money laundering schemes, corruption, violent debt collection, and planned assaults. In Sweden, authorities linked EncroChat data to dozens of murder investigations connected to gang conflicts in cities such as Stockholm and Gothenburg.

UK Criminal Cases

In the UK, Operation Venetic was launched in 2020 after intelligence from French authorities was shared with the National Crime Agency. The operation resulted in over 1,500 arrests, the seizure of more than £150 million in cash, tonnes of drugs, and hundreds of firearms.

High-profile convictions followed. Courts heard evidence from decrypted messages detailing plans to flood cities with cocaine or arrange violent retribution. Judges often described the EncroChat evidence as “overwhelming,” with defendants unaware that police were reading their communications in real time.

The 2020 Hack

EncroChat was compromised in early 2020 when French and Dutch investigators infiltrated its servers. In March 2020, French authorities reportedly gained access to the company’s infrastructure, believed to be hosted in Roubaix, northern France. Rather than simply intercepting messages in transit, investigators deployed a technical implant that captured messages directly from devices.

Between April and June 2020, millions of messages were collected and shared through Europol. Law enforcement agencies across Europe began making arrests based on real-time intelligence. On 12 June 2020, EncroChat sent a broadcast message to users warning that the platform had been compromised and advising them to dispose of devices immediately.

The company ceased operations shortly after. Its website went offline, and customer support channels disappeared. By then, authorities had gathered vast amounts of data, reportedly more than 100 million messages.

Technical Method

Authorities have not publicly disclosed full technical details of the hack. However, court proceedings indicated that a “technical tool” was deployed to extract data from devices before encryption was applied or after decryption occurred. This meant law enforcement accessed readable messages rather than breaking encryption itself.

This distinction became central in legal challenges. Defence lawyers argued that evidence might be inadmissible if it constituted unlawful interception. Prosecutors maintained that the data was lawfully obtained under French judicial authorisation and shared through established European cooperation frameworks.

EncroChat evidence sparked major legal debates in multiple jurisdictions. In the UK, defence teams argued that the evidence amounted to intercept material, which is generally inadmissible under domestic law. Courts ultimately ruled that the data was obtained as stored communications rather than live intercepts, allowing its use in prosecutions.

Appeals reached the Court of Appeal in London, where judges upheld the admissibility of EncroChat material. Similar challenges arose in Germany and the Netherlands, with varying outcomes depending on national legal frameworks.

Critics questioned transparency around the hack. Because French authorities classified aspects of the operation, defence lawyers argued they were unable to fully examine how data was captured. Courts generally balanced these concerns against the seriousness of organised crime exposed.

Data Integrity

Another key issue was whether data could have been altered or corrupted. Prosecutors emphasised forensic safeguards, including digital signatures and audit trails. Investigators testified about secure data transfer processes through Europol channels.

So far, large-scale evidence tampering has not been proven in court. Thousands of convictions across Europe suggest judicial systems have largely accepted the reliability of EncroChat material.

Impact on Organised Crime

The EncroChat hack significantly disrupted organised crime networks across Europe. Authorities reported temporary shortages in cocaine supply in parts of the UK and Scandinavia during mid-2020. Gang leaders were arrested, logistics chains were exposed, and cash seizures reached record levels.

However, experts argue the disruption was temporary. Criminal groups quickly migrated to alternative encrypted platforms. Services such as Sky ECC later came under similar scrutiny, and law enforcement agencies continued developing cyber infiltration capabilities.

EncroChat demonstrated that encrypted criminal networks were not immune to state-level cyber operations. It also highlighted how digital evidence can provide unparalleled insight into criminal ecosystems, mapping relationships and hierarchies.

Broader Encryption Debate

The EncroChat case intensified debates around encryption and privacy. Privacy advocates warned against weakening encryption standards, arguing that secure communications protect journalists, activists, and ordinary citizens. Law enforcement agencies countered that targeted hacking under judicial oversight is distinct from blanket surveillance.

European policymakers began discussing new frameworks addressing encrypted services. The case became an example cited in debates over lawful access, cybersecurity, and cross-border cooperation.

Importantly, EncroChat was not a mainstream messaging app. It was marketed almost exclusively within criminal circles. This fact shaped public perception, with limited sympathy for affected users.

Practical Information and Planning

EncroChat no longer operates. Its services ceased in June 2020 following the hack announcement. There are no official customer channels, subscription options, or active devices available legally.

Users who possessed EncroChat devices were advised in June 2020 to destroy them. Law enforcement agencies continue to analyse archived data, and investigations remain ongoing in several countries.

For researchers or journalists studying EncroChat, most public information comes from court proceedings in the UK, France, the Netherlands, and Germany. Trials linked to Operation Venetic continue to conclude, with sentencing often reflecting the scale of organised crime uncovered.

Anyone concerned about digital security should note that legitimate encrypted messaging services operate transparently and legally, unlike EncroChat’s covert distribution model.

Seasonal and Ongoing Developments

As of 2025, EncroChat cases are still progressing through European courts. Appeals related to disclosure and technical evidence continue, particularly in Germany. In the UK, most major trials concluded between 2021 and 2024, though asset recovery proceedings remain active.

The long-term significance of EncroChat lies in its precedent. Law enforcement agencies increasingly invest in cyber capabilities to infiltrate criminal communications platforms rather than attempting to break encryption directly.

The case also influenced criminal behaviour. Many organised crime groups now rotate devices more frequently, use multiple platforms, or adopt decentralised communication strategies to reduce vulnerability.

FAQs

What was EncroChat used for?

EncroChat was primarily used by organised crime groups to coordinate drug trafficking, firearms sales, money laundering, and violent crimes. Its encrypted messaging and anonymity made it attractive to criminals. Evidence from the 2020 hack revealed detailed operational planning. Law enforcement described it as a secure criminal communication hub.

When was EncroChat hacked?

EncroChat was infiltrated in early 2020, with large-scale data collection occurring between April and June 2020. French authorities led the technical operation. Users were warned of compromise on 12 June 2020. The service shut down shortly after.

How many people used EncroChat?

Investigators estimated around 60,000 users worldwide at its peak. Approximately 10,000 were believed to be in the UK. The user base was concentrated in Europe. Most were linked to organised crime networks.

How did police hack EncroChat?

Authorities deployed a technical tool that captured messages directly from devices. This meant they accessed readable communications without breaking encryption algorithms. The operation was authorised under French law. Data was shared with other countries through Europol.

Is EncroChat still active?

No, EncroChat ceased operations in June 2020. Its website and services were shut down. Devices became unusable once the network closed. There is no legal way to access the platform today.

What was Operation Venetic?

Operation Venetic was the UK’s response to EncroChat intelligence. Led by the National Crime Agency, it resulted in over 1,500 arrests. Authorities seized large quantities of drugs, cash, and firearms. It remains one of the UK’s largest anti-organised crime operations.

Were EncroChat convictions upheld?

Yes, courts in multiple countries have upheld convictions based on EncroChat evidence. Legal challenges focused on admissibility and interception laws. Appeals in the UK confirmed the data was lawfully obtained. Similar rulings occurred in other jurisdictions.

How much did EncroChat cost?

Subscriptions typically cost around €1,000 to €1,500 for six months. Payment was often made in cryptocurrency or cash. Devices were sold through resellers rather than public retail. The high cost limited access to serious criminal networks.

Did EncroChat guarantee anonymity?

EncroChat marketed itself as secure and anonymous. However, the 2020 hack proved it was vulnerable to law enforcement infiltration. User identities were uncovered through message analysis and operational details. Anonymity was not guaranteed in practice.

What replaced EncroChat?

After its shutdown, some users migrated to other encrypted platforms such as Sky ECC. Law enforcement later infiltrated additional services. Criminal communication methods continue evolving. Authorities adapt strategies accordingly.

How many arrests resulted?

Across Europe, thousands of arrests were made. In the UK alone, more than 1,500 arrests were reported. Seizures included tonnes of cocaine and heroin. Cash recoveries exceeded hundreds of millions of euros.

Why is EncroChat important?

EncroChat marked a turning point in digital policing. It demonstrated that encrypted criminal platforms could be infiltrated. The operation reshaped organised crime investigations across Europe. Its legal and technological implications continue influencing policy debates.

EncroChat remains one of the most significant law enforcement operations against encrypted criminal networks in modern European history. Its rise, infiltration, and aftermath continue shaping discussions around encryption, cyber policing, and organised crime strategy well into 2025.

Read More on Manchesterindependent

Leave a Reply

Your email address will not be published. Required fields are marked *