Security News > 2024 > May > Police seize over 100 malware loader servers, arrest four cybercriminals
An international law enforcement operation codenamed 'Operation Endgame' has seized over 100 servers worldwide used by multiple major malware loader operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. The action, which occurred between May 27 and 29, 2024, involved 16 location searches across Europe and led to the arrest of four individuals, one in Armenia and three in Ukraine.
The police have identified eight fugitives linked to the malware operations, who will be added to Europol's 'Most Wanted' list later today.
Operation Endgame involved police forces from Germany, the United States, the United Kingdom, France, Denmark, and the Netherlands.
The cybercriminals behind them typically send malicious emails to deliver the malware or hide payloads on trojanized installers promoted through malvertising or torrents.
Europol said that one of the main suspects involved in one of the targeted malware operations made over 69 million Euros by renting out their infrastructure for ransomware deployment.
Ebury botnet malware infected 400,000 Linux servers since 2009.
News URL
Related news
- Police arrest four suspects linked to LockBit ransomware gang (source)
- New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (source)
- Dutch police arrest admin of 'Bohemia/Cannabia' dark web market (source)
- Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks (source)
- Perfctl malware strikes again as crypto-crooks target Docker Remote API servers (source)
- Redline, Meta infostealer malware operations seized by police (source)
- Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware (source)