May 30, 2024 at 04:53AM
‘Operation Endgame’ seized 100 servers used by major malware loader operations in an international law enforcement operation. The action involved 16 location searches across Europe, leading to four arrests and identifying eight fugitives. The seized infrastructure spread across Europe and North America, hosting over 2,000 domains now under authorities’ control. Operation Endgame involved police forces from six countries and was supported by intelligence from multiple experts. Millions of computers were infected by the specialized tools used by cybercriminals, and one main suspect made over 69 million Euros by renting out criminal infrastructure for ransomware deployment. Further information about the suspects and the law enforcement operation will be published later today on a dedicated portal.
Key Takeaways from Meeting Notes:
1. Operation Endgame seized over 100 servers worldwide that were being used by major malware loader operations, leading to the arrest of individuals in Armenia and Ukraine.
2. Eight fugitives linked to the malware operations will be added to Europol’s ‘Most Wanted’ list.
3. The seized infrastructure, spread across Europe and North America, hosted over 2,000 domains facilitating illicit services, now under control of the authorities.
4. The operation involved police forces from Germany, the United States, the United Kingdom, France, Denmark, and the Netherlands, and was supported by intelligence experts from various organizations.
5. Malware droppers, which are specialized tools designed to establish initial access to devices, were identified as having evolved from banking trojans to focus on initial access and deliver more dangerous payloads.
6. One of the main suspects involved in the targeted malware operations reportedly made over 69 million Euros ($74.5M) by renting out criminal infrastructure for ransomware deployment.
7. More information about the suspects and the law enforcement operation is scheduled to be published on a dedicated portal later today.