• Operation Endgame 3.0 pus

    From Mike Powell@1:2320/105 to All on Saturday, November 15, 2025 09:15:22
    Operation Endgame 3.0 push takes down more cybercrime servers, disrupting criminal gangs

    Date:
    Fri, 14 Nov 2025 12:03:00 +0000

    Description:
    Rhadamanthys, VenomRAT, and Elysium have officially been taken down, and one person was arrested.

    FULL STORY

    Europol has launched the latest phase of its Operation Endgame, looking to disrupt the activities of some of the largest malware operations active
    today.

    A press release published on Europols website claims between November 10 and
    13 its agents, together with national law enforcement agencies from a handful of European countries, disrupted Rhadamanthys, VenomRAT, and Elysium.

    The activities resulted in more than 1,000 servers either taken down or disrupted, 20 domains seized, and 11 locations searched (one in Germany and Greece, and nine in the Netherlands). Furthermore, one person was arrested, suspected of operating VenomRAT.

    Europol's activities

    The dismantled malware infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials, Europol explained.

    Many of the victims were oblivious to the fact they were targeted, it added, and said that the main suspect behind the infostealer had access to over 100,000 crypto wallets potentially worth millions.

    News of the operation first surfaced two days ago, when independent security researchers saw Rhadamanthys users being locked out of the platform. Those users, as well as the malwares operators, blamed the German authorities for
    the disruption, and urged their users to cover up their tracks.

    Operation Endgames last activity was in May 2025, when Europol and Eurojust dismantled a ransomware kill chain. In that operation, the police seized roughly 300 servers, took down 650 domains, and issued international arrest warrants against 20 individuals. The police also seized 3.5 million in
    various cryptocurrencies.

    Disrupting malware operations is commendable, but without arrests, it is only
    a matter of time before they resurface. DanaBot , one of operations that were taken down in May, resurfaced six months later, with rebuilt infrastructure
    and new cryptocurrency wallets to siphon stolen funds to.

    Other backdoor, malware, and loader operations that were disrupted through Operation Endgame include IcedID, Smokeloader, Qakbot, and Trickbot.

    Via Infosecurity Magazine

    ======================================================================
    Link to news story: https://www.techradar.com/pro/security/operation-endgame-push-takes-down-more- cybercrime-servers-disrupting-criminal-gangs

    $$
    --- SBBSecho 3.28-Linux
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)