US, international and industry partners topple infrastructure of popular info-stealer malware
- From 19 to 22 May 2025, European, American, and Canadian authorities dismantled over 300 servers and neutralized 650 domains linked to a major malware operation worldwide.
- This action is part of Operation Endgame, a coordinated effort that started in early 2024 to combat initial access malware enabling ransomware and other cyberattacks.
- Authorities targeted multiple malware loaders including Bumblebee, Trickbot, Qakbot, and DanaBot, which facilitate system infiltration and delivery of more harmful payloads like ransomware.
- The operation resulted in 20 criminal charges and international arrest warrants, with 18 suspects slated to be placed on the EU Most Wanted list on Friday, and authorities confiscated cryptocurrency valued at 3.5 million euros.
- Authorities said the takedown broke the ransomware kill chain at its source, demonstrating law enforcement’s continuing ability to disrupt cybercriminal infrastructures globally.
25 Articles
25 Articles

EU, US authorities take down malware network
PARIS (Reuters) -European, American and Canadian authorities have taken down over 300 servers worldwide and issued international arrest warrants against 20 suspects in a crackdown on malware, EU agency for criminal justice cooperation Eurojust said in a statement, the latest…
Lumma Stealer Infrastructure Behind Global Attacks On Millions Of Users Dismantled - Cybernoz - Cybersecurity News
The U.S. Justice Department, in collaboration with the FBI and private sector partners like Microsoft, has announced the disruption of the Lumma Stealer (also known as LummaC2) malware infrastructure. This global operation targeted the notorious Malware-as-a-Service (MaaS) platform, which has been linked to over 1.7 million instances of data theft worldwide. The unsealing of two warrants enabled the seizure of five critical internet domains used…
DOJ and Microsoft Disrupt LummaC2 Malware Network with Domain Seizures
In a coordinated effort with Microsoft and other private sector partners, this action represents a major disruption of one of the most widely used infostealer services in online criminal marketplaces. Malware Service Targeted Millions with Credential Theft LummaC2, a malicious platform rented and distributed by cybercriminals, allowed users to harvest browser data, login credentials, autofill content, and cryptocurrency wallet seed phrases from …
Coverage Details
Bias Distribution
- 80% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage