HomeNewsPolice take down three cybercrime operations in newest spherical of ‘whack-a-mole’

Police take down three cybercrime operations in newest spherical of ‘whack-a-mole’

A world coalition of regulation enforcement companies coordinated by Europol focused and took down three cybercrime operations in its newest spherical of what authorities name “Operation Endgame.”

In a press launch, Europol stated that the police operation focused the infostealing malware Rhadamanthys, a botnet referred to as Elysium, and the distant entry trojan VenomRAT. The authorities say all three “performed a key position in worldwide cybercrime.” Police seized greater than 1,000 servers as a part of the operation. 

Europol stated police arrested the unnamed “predominant suspect” behind VenomRAT in Greece on November 3.

“The dismantled malware infrastructure consisted of a whole bunch of 1000’s of contaminated computer systems containing a number of million stolen credentials,” the press launch learn. “Most of the victims weren’t conscious of the an infection of their programs.”

Based on Europol, the principle suspect behind Rhadamantys had entry to over 100,000 crypto wallets, “probably price tens of millions of euros.”

As an infostealer, Rhadamantys is designed to steal varied sorts of data from contaminated gadgets, together with passwords and cryptocurrency pockets keys. Rhadamantys spiked in recognition in October after authorities took down the favored infostealer Lumma earlier within the yr, displaying that after takedowns, criminals adapt by utilizing completely different hacking instruments that is perhaps much less recognized on the time.

See also  Harnessing the ability of AI for a safe future

When Rhadamantys launched in 2022, it initially relied on spreading by means of malicious Google commercials, and later grew because of word-of-mouth on underground boards, in line with Lumen’s Black Lotus Labs, one of many cybersecurity business companions in Operation Endgame. 

Techcrunch occasion

San Francisco
|
October 13-15, 2026

The agency wrote in a weblog submit that Rhadamantys had a “dramatic uptick” and a “constant rise within the variety of victims” after the Lumma takedown, making it “the most important information-stealer malware by quantity.” In October, the infostealer had compromised greater than 12,000 victims, in line with the agency.

Ryan English, a researcher at Black Lotus Labs, informed information.killnetswitch that Rhadamantys “emerged because the ‘subsequent’ go-to infostealer” after Lumma went down.

“We all know that others will take their place, so we simply hold monitoring to see who’s rising from that,” stated English, including that regulation enforcement and the broader business “can solely accomplish that a lot at any time.” 

See also  Critics pan adware maker NSO’s transparency claims amid its push to enter US market

“So in a really actual sense, it’s whack-a-mole ceaselessly,” stated English.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular