Tomcat
Professional
- Messages
- 2,689
- Reaction score
- 916
- Points
- 113
During a large-scale operation of law enforcement agencies, codenamed Operation Endgame, more than 100 servers were confiscated that were used by large malware loaders, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader and SystemBC.
The operation, which lasted from May 27 to 29, 2024, consisted of 16 searches across Europe, and also led to the arrest of four people (one in Armenia and three in Ukraine). In addition, the police say that they have discovered eight fugitives from justice associated with the activity of the mentioned malware, who will now be added to the list of Europol's most wanted criminals.
The infrastructure seized by law enforcement officers was located in Europe and North America, and included more than 2,000 domains.
Police officers from Germany, the United States, the United Kingdom, France, Denmark and the Netherlands participated in Operation Endgame. In addition, operational information was provided to the authorities by experts from Bitdefender, Cryptolaemus, Sekoia, Shadowserver, Team Cymru, Prodaft, Proofpoint, NFIR, Computest, Northwave, Fox-IT, HaveIBeenPwned, Spamhaus and DIVD, who shared with law enforcement information about the botnet infrastructure and the internal workings of malware.
Recall that droppers are used to gain initial access to victims ' devices and deliver additional payloads. Their operators usually use malicious emails or hide their malware in various installers, which they promote with malicious ads or distribute in torrents.
Many of the above-mentioned droppers started out as banking Trojans, but then evolved and began to focus on providing initial access, while simplifying their work and removing" extra " malicious functions to reduce the likelihood of detection.
Once infected, droppers inject more dangerous and useful payloads, including infostilers and ransomware, into the compromised system.
According to Europol, one of the main suspects involved in the management of one of the malware, earned more than $ 74.5 million in cryptocurrency, providing its infrastructure for the deployment of ransomware. Law enforcement officers note that " the suspect's transactions are being monitored, and legal permission has already been obtained to seize these assets."
• Source: https://www.europol.europa.eu/media...gainst-botnets-hits-dropper-malware-ecosystem
The operation, which lasted from May 27 to 29, 2024, consisted of 16 searches across Europe, and also led to the arrest of four people (one in Armenia and three in Ukraine). In addition, the police say that they have discovered eight fugitives from justice associated with the activity of the mentioned malware, who will now be added to the list of Europol's most wanted criminals.
The infrastructure seized by law enforcement officers was located in Europe and North America, and included more than 2,000 domains.
Police officers from Germany, the United States, the United Kingdom, France, Denmark and the Netherlands participated in Operation Endgame. In addition, operational information was provided to the authorities by experts from Bitdefender, Cryptolaemus, Sekoia, Shadowserver, Team Cymru, Prodaft, Proofpoint, NFIR, Computest, Northwave, Fox-IT, HaveIBeenPwned, Spamhaus and DIVD, who shared with law enforcement information about the botnet infrastructure and the internal workings of malware.
Recall that droppers are used to gain initial access to victims ' devices and deliver additional payloads. Their operators usually use malicious emails or hide their malware in various installers, which they promote with malicious ads or distribute in torrents.
Many of the above-mentioned droppers started out as banking Trojans, but then evolved and began to focus on providing initial access, while simplifying their work and removing" extra " malicious functions to reduce the likelihood of detection.
Once infected, droppers inject more dangerous and useful payloads, including infostilers and ransomware, into the compromised system.
According to Europol, one of the main suspects involved in the management of one of the malware, earned more than $ 74.5 million in cryptocurrency, providing its infrastructure for the deployment of ransomware. Law enforcement officers note that " the suspect's transactions are being monitored, and legal permission has already been obtained to seize these assets."
• Source: https://www.europol.europa.eu/media...gainst-botnets-hits-dropper-malware-ecosystem