Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

November 16, 2025

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

November 15, 2025

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

November 15, 2025
Facebook X (Twitter) Instagram
Sunday, November 16
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Operation Endgame 3.0 Dismantles Three Major Malware Networks
News

Operation Endgame 3.0 Dismantles Three Major Malware Networks

Team-CWDBy Team-CWDNovember 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Three malware strains popular with cybercriminals have been taken down in a large-scale law enforcement operation that spanned 11 countries.

The dismantling of the malware networks is part of an ongoing effort, dubbed Operation Endgame. The latest activity, Operation Endgame 3.0, occurred between November 10 and 13.

Infrastructure linked to Rhadamanthys, a notorious information stealer (infostealer), a remote access trojan called VenomRAT and the Elysium botnet have all been impacted.

The raids also resulted in:

  • Over 1025 servers taken down or disrupted worldwide
  • 20 domains seized
  • 11 locations searched (one in Germany, one in Greece, and 9 in the Netherlands)
  • The arrest of the suspected main operator of VenomRAT in Greece

“The infrastructure dismantled during the action days was responsible for infecting hundreds of thousands of victims worldwide with malware,” said Europol in a public statement published on November 13.

The operation involved law enforcement agencies from six EU countries, Australia, Canada, the UK and the US, with the collaboration of Europol, Eurojust and over 30 private partners from the cybersecurity industry. The initiative was coordinated from Europol’s headquarters in The Hague, Netherlands.

Takedown of Rhadamanthys, VenomRAT and Elysium

Rhadamanthys infostealer “had grown to become one of the leading infostealers since Operation Endgame ‘Season 2’ disrupted the infostealer landscape,” according to a Shadowserver Foundation statement published on November 13.

In this statement, the UK government-funded non-profit announced that it had sent notifications about devices infected with the Rhadamanthys infostealer malware between March and November 2025 to 201 national computer security incident response teams (CSIRTs) in 175 countries and over 10,000 network owners globally.

“The main suspect behind the infostealer had access to over 100,000 crypto wallets belonging to these victims, potentially worth millions of euros,” the Europol announcement noted.

The Europol announcement was also accompanied by a new video about Rhadamanthys on the Operation Endgame website, entitled S03E01 “STICKY FINGERS.”

First discovered in June 2020, VenomRAT is a modified fork of the Quasar remote access trojan (QuasarRAT).

VenomRAT has been advertised as an effective tool to remotely access computers for $150 per month. It is generally distributed as malicious attachments in spam emails.

Once installed, VenomRAT uses obfuscated Microsoft Office macro script to download malicious files, then executes functions from library and uses PowerShell scripts for further actions.

“The dismantled malware infrastructure, encompassing Rhadamanthys, VenomRAT and the Elysium botnet, consisted of hundreds of thousands of infected computers containing several million stolen credentials,” said Europol.

“Many of the victims were not aware of the infection of their systems.” Potential victims can now check if their systems have been infected by visiting the Netherlands police’s CheckYourHack website and the Have I Been Pwned portal.

Operation Endgame 3.0: Third Blow to Cybercrime-Enabling Industry

This latest operation is the third series of takedowns of cybercrime-enabling infrastructure after Operation Endgame 1.0 (May 2024) and Operation Endgame 2.0 (April 2025).

This new series involved over 100 law enforcement officers from Australia, Canada, Denmark, France, Germany, Greece and the US.

The Europol command post facilitated the exchange of intelligence on seized servers, suspects, and the transfer of seized data.

Eurojust also assisted with the execution of a European Arrest Warrant and European Investigation Orders.

The private sector partners included Abuse.ch, Bitdefender, Crowdstrike, Cryptolaemus, Cymru, the Dutch Institute for Vulnerability Disclosure (DIVD), HaveIBeenPwned, Lumen, Proofpoint, the Shadowserver Foundation and its Registrar of Last Resort (RoLR), Spamhaus and Spycloud.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed
Next Article Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
Team-CWD
  • Website

Related Posts

News

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

November 16, 2025
News

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

November 15, 2025
News

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

November 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

How chatbots can help spread scams

October 14, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.