US, international and industry partners topple infrastructure of popular info-stealer malware
- European, American, and Canadian authorities took down over 300 servers and neutralized 650 domains worldwide from May 19 to 22, 2025.
- The most recent stage of Operation Endgame built upon a major botnet disruption carried out in May 2024, involving coordinated actions by seven nations.
- Authorities targeted initial access malware, which enables cybercriminals to covertly infect devices and load additional malware like ransomware onto victims' systems.
- International arrest warrants were issued for 20 suspects—including 18 who are to be added to the EU Most Wanted list—while authorities confiscated cryptocurrency assets valued at 3.5 million euros during the operation week.
- The coordinated takedown disrupted key cybercrime operations, dealt a direct blow to ransomware deployment, and demonstrated law enforcement’s ability to adapt and break the ransomware kill chain at its source.
26 Articles
26 Articles

EU, US authorities take down malware network
PARIS (Reuters) -European, American and Canadian authorities have taken down over 300 servers worldwide and issued international arrest warrants against 20 suspects in a crackdown on malware, EU agency for criminal justice cooperation Eurojust said in a statement, the latest…
Lumma Stealer Infrastructure Behind Global Attacks On Millions Of Users Dismantled - Cybernoz - Cybersecurity News
The U.S. Justice Department, in collaboration with the FBI and private sector partners like Microsoft, has announced the disruption of the Lumma Stealer (also known as LummaC2) malware infrastructure. This global operation targeted the notorious Malware-as-a-Service (MaaS) platform, which has been linked to over 1.7 million instances of data theft worldwide. The unsealing of two warrants enabled the seizure of five critical internet domains used…
DOJ and Microsoft Disrupt LummaC2 Malware Network with Domain Seizures
In a coordinated effort with Microsoft and other private sector partners, this action represents a major disruption of one of the most widely used infostealer services in online criminal marketplaces. Malware Service Targeted Millions with Credential Theft LummaC2, a malicious platform rented and distributed by cybercriminals, allowed users to harvest browser data, login credentials, autofill content, and cryptocurrency wallet seed phrases from …
Coverage Details
Bias Distribution
- 80% of the sources are Center
To view factuality data please Upgrade to Premium