• BCLCC - Brigade Centrale de Lutte Contre la Cybercriminalité logo
  • National enhed for Særlig Kriminalitet logo
  • Europol logo
  • Federal Bureau of Investigation logo
  • JUNALCO logo
  • National Crime Agency logo
  • Office anti-cybercriminalité logo
  • Openbaar Ministerie logo
  • Politie logo
  • FIOD logo
  • Unité nationale cyber de la Gendarmerie nationale logo
  • United States Secret Service logo
  • DCIS logo
  • Eurojust logo
  • Bundeskriminalamt logo
  • Royal Canadian Mounted Police logo
  • Ottawa Police Service logo
  • Belgian Federal Police logo
  • Australian Federal Police logo

Operation Endgame

What will be (y)our next move?

О нас

С возвращением в The Endgame.

Начался третий сезон Operation Endgame.

Фрагменты, записи, шепот... Формируются связи. История развивается. Некоторые персонажи возвращаются. Появляются новые. Имена, которые вы, возможно, узнаете. Другие — пока нет.

Мы никуда не уходили. Некоторые из вас продолжали двигаться. Некоторые стояли на месте. Все были замечены.

Что будет дальше? Увидите. Не всё сразу, и, возможно, не там, где вы ожидаете.

Хотите поговорить? Вы знаете, где нас найти. Мы будем слушать. И наблюдать.

Подумайте о нашем и вашем следующем шаге.

новости

Еще новости...

Endgame сообщение для печати

End of the game for cybercrime infrastructure: 1025 servers taken down

Between 10 and 13 November 2025, the latest phase of Operation Endgame was coordinated from Europol’s headquarters in The Hague. The actions targeted one of the biggest infostealer Rhadamanthys, the Remote Access Trojan VenomRAT, and the botnet Elysium, all of which played a key role in international cybercrime. Authorities took down these three large cybercrime enablers. The main suspect for VenomRAT was arrested in Greece on 3 November 2025.

The infrastructure dismantled during the action days was responsible for infecting hundreds of thousands of victims worldwide with malware. The dismantled malware infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials. Many of the victims were not aware of the infection of their systems. The main suspect behind the infostealer had access to over 100.000 crypto wallets belonging to these victims, potentially worth millions of euros. Check if your computer has been infected and what to do if so: https://www.politie.nl/checkyourhack and https://haveibeenpwned.com.

При поддержке

  • Cryptolaemus logo
  • Team Cymru logo
  • Prodaft logo
  • Proofpoint logo
  • Sekoia logo
  • Shadowserver logo
  • Zscaler logo
  • Abuse.ch logo
  • Computest logo
  • Spamhaus logo
  • Have I Been Pwned logo
  • Bitdefender logo
  • Fox-IT logo
  • NFIR logo
  • Northwave Cybersecurity logo
  • Crowdstrike logo
  • Lumen logo
  • Spycloud logo
  • Trellix logo
  • ESET logo
  • Microsoft logo
  • Eye Security logo
  • DataExpert logo
  • DIVD logo
  • NCSC logo