More

    Europol Goes After Orgs Behind 3 Malware Strains, Takes Down 1,000+ Servers

    Don’t miss out on our latest stories. Add PCMag as a preferred source on Google.

    Law enforcement has disrupted three malware strains that cybercriminals were using to infect and hijack Windows PCs in order to steal passwords.

    Europol dismantled the servers powering the infostealing malware Rhadamanthys, the remote access Trojan VenomRAT, and Elysium, which focused on trapping PCs in a botnet.  

    “The dismantled malware infrastructure consisted of hundreds of thousands of infected computers containing several million stolen credentials. Many of the victims were not aware of the infection of their systems,” Europol said. 

    Europol’s operation involved seizing or disrupting over 1,025 servers and taking control of more than 20 internet domains. In addition, investigators arrested the “main suspect” allegedly behind VenomRAT in Greece on Nov. 3.

    Cybercriminals are reporting that they have lost access to Rhadamanthys, which operated as a subscription-based malware. It has been active for at least three years and can spread through fake sites impersonating official brands, as well as other phishing attacks. A state-sponsored hacking group from Russia also appears to have been using Rhadamanthys.

    If installed, Rhadamanthys can take screenshots of a computer screen, while also stealing browser information and cryptocurrency wallet data. Europol is indicating the main suspect behind Rhadamanthys “had access to over 100,000 crypto wallets” belonging to various victims, and “potentially worth millions of Euros.” 

    VenomRAT operated in a similar fashion, spreading through fake websites, including some impersonating the cybersecurity vendor Bitdefender. If installed, the remote access Trojan could secretly steal passwords while creating a way to hijack the PC. Meanwhile, Elysium appears to be a newer malware strain focused on using infected PCs to create a botnet, a collection of computers that can be harnessed for DDoS attacks and other malicious activities.  

    Europol took down the malware operations with the help of law enforcement agencies across Europe and the US, as well as cybersecurity vendors such as Proofpoint, CrowdStrike, and Bitdefender. 

    Despite the crackdown, there are signs that Rhadamanthys remains active, according to one cybersecurity researcher. Still, Europol is also using the news to warn cybercriminals. The agency created a video to troll the operators of Rhadamanthys, teasing the identification of both the malware’s director and customers, following the server and domain seizures. 

    Europol urges victims to check if their computers have been infected. If so, politie.nl/checkyourhack and haveibeenpwned.com have more resources.

    About Our Expert

     

    Latest articles

    Related articles