Security News > 2024 > May > Police seize over 100 malware loader servers, arrest four cybercriminals
An international law enforcement operation codenamed 'Operation Endgame' has seized over 100 servers worldwide used by multiple major malware loader operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. The action, which occurred between May 27 and 29, 2024, involved 16 location searches across Europe and led to the arrest of four individuals, one in Armenia and three in Ukraine.
The police have identified eight fugitives linked to the malware operations, who will be added to Europol's 'Most Wanted' list later today.
Operation Endgame involved police forces from Germany, the United States, the United Kingdom, France, Denmark, and the Netherlands.
The cybercriminals behind them typically send malicious emails to deliver the malware or hide payloads on trojanized installers promoted through malvertising or torrents.
Europol said that one of the main suspects involved in one of the targeted malware operations made over 69 million Euros by renting out their infrastructure for ransomware deployment.
Ebury botnet malware infected 400,000 Linux servers since 2009.
News URL
Related news
- Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware (source)
- Cybercriminals used a gaming engine to create undetectable malware loader (source)
- Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware (source)
- Russia arrests cybercriminal Wazawaka for ties with ransomware gangs (source)
- Police seizes largest German online crime marketplace, arrests admin (source)
- Police shuts down Manson cybercrime market, arrests key suspects (source)
- Police arrest suspect in murder of UnitedHealthcare CEO, with grainy pics the only tech involved (source)
- Police shuts down Rydox cybercrime market, arrests 3 admins (source)