• Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner
  • Logo Partner

News

Previously in Endgame

Operation ENDGAME strikes again: the ransomware kill chain broken at its source

Cybercriminals around the world have suffered a major disruption after law enforcement and judicial authorities, coordinated by Europol and Eurojust, dismantled key infrastructure behind the malware used to launch ransomware attacks. From 19 to 22 May, authorities took down some 300 servers worldwide, neutralised 650 domains, and issued international arrest warrants against 20 targets, dealing a direct blow to the ransomware kill chain.

In addition, EUR 3.5 million in cryptocurrency was seized during the action week, bringing the total amount seized during Operation Endgame to EUR 21.2 million.

This latest phase of Operation ENDGAME follows on from the largest-ever international action against botnets in May 2024. It targeted new malware variants and successor groups that re-emerged after last year’s takedowns, reinforcing law enforcement’s capacity to adapt and strike back – even as cybercriminals retool and reorganise.

Operation Endgame follow-up leads to five detentions and interrogations as well as server takedowns

In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as ‘Superstar’, faced consequences such as arrests, house searches, arrest warrants or ‘knock and talks’. Superstar used his botnet to run a pay-per-install service, enabling customers to gain access to victims’ machines.

Customers used the service to deploy malware for their own criminal activities. Investigations revealed that botnet access was purchased for a range of purposes, including keylogging, webcam access, ransomware deployment, cryptomining and more. Law enforcement tracked down the customers as they were registered in a database seized during Operation Endgame.

Robust international actions against illicit virtual currency exchanges

Operation Endgame continues taking actions to disrupt the cybercriminal ecosystem. In the last week, multiple cryptocurrency exchanges were taken offline by international law enforcement agencies and judicial authorities. These service providers facilitated many different criminal financial flows, such as ransomware.

Money laundering facilitates all kinds of serious crime and enables criminals to stay out of reach of investigative authorities. Service providers have an obligation to investigate whether money may have a criminal origin. Knowingly accepting cryptocurrencies derived from crime and thus facilitating money laundering is always punishable by law.

Several botnets dismantled in largest international operation

During a joint action by international law enforcement agencies and judicial authorities several botnets that played a key role in cybercrime were dismantled. Four arrests were made and sixteen premises were searched worldwide over the past few days. Additionally, eight summons were served against suspects. Many national and international organisations in the public and private sectors also played an important role in this operation.

The operation enabled us to simultaneously take down these botnets and disrupt the infrastructure used by cybercriminals. Botnets are used for different types of cybercrime, for example ransomware. The dismantled botnets consisted of millions of infected computer systems.

Many of the victims were not aware of the infection of their systems. The estimated financial loss these criminals have caused to companies and government institutions amounts to hundreds of millions of euros.

This large-scale action is called Operation Endgame.

Operation Endgame does not end today. New actions will be announced on this website.

If you have information about the suspects in Operation Endgame, feel free to contact us

Partners

  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor
  • Logo Sponsor