Topic: operation endgame
-
Police Takedown: Rhadamanthys, VenomRAT, and Elysium Malware Operations Disrupted
An international law enforcement effort led by Europol and Eurojust dismantled over 1,000 servers used by major malware families like Rhadamanthys, VenomRAT, and the Elysium botnet, with support from nine countries and private cybersecurity firms. The operation resulted in the arrest of a key sus...
Read More » -
Operation Endgame 3.0 Takes Down Three Major Malware Networks
Operation Endgame 3.0 dismantled three major malware networks—Rhadamanthys, VenomRAT, and Elysium—through a coordinated international law enforcement effort across eleven countries. The operation disrupted over 1025 servers, seized 20 domains, and led to the arrest of the suspected VenomRAT opera...
Read More » -
DanaBot Malware Returns to Target Windows After 6-Month Hiatus
DanaBot malware has re-emerged with a new version (v669) after a six-month hiatus, now utilizing Tor-based infrastructure and cryptocurrency addresses for stolen funds. Originally a banking trojan distributed as malware-as-a-service, it evolved into a modular threat targeting credentials and cryp...
Read More » -
Cybercriminals Lose Control: Rhadamanthys Infostealer Shut Down
The Rhadamanthys infostealer malware service has been disrupted, with criminal subscribers losing access to their data-collection servers, possibly due to law enforcement actions by German authorities. Subscribers reported that their administrative panels now require certificate-based authenticat...
Read More » -
Dutch Police Seize 250 Servers in Bulletproof Hosting Crackdown
Dutch law enforcement dismantled a major bulletproof hosting service used exclusively by cybercriminals, seizing approximately 250 physical servers and taking thousands of virtual servers offline. The service facilitated serious criminal activities like ransomware, botnets, and phishing by ignori...
Read More » -
VPN Credentials Fuel 50% of Ransomware Attacks
Ransomware activity surged in Q3 2025, with compromised VPN credentials being the primary entry point for nearly half of all breaches, driven mainly by three groups: Akira, Qilin, and INC Ransomware. The Akira group specifically targeted SonicWall appliances using credential stuffing attacks, exp...
Read More »