Latest news with #Eurojust


Economic Times
24-05-2025
- Economic Times
EU, US authorities take down malware network
European, American and Canadian authorities have taken down over 300 servers worldwide and issued international arrest warrants against 20 suspects in a crackdown on malware, EU agency for criminal justice cooperation Eurojust said in a statement, the latest phase in Operation Endgame. By the numbers German, French, Dutch, Danish, British, American and Canadian authorities joined forces this week against the world's most dangerous malware variants and the perpetrators behind them. More than three dozen suspects were identified and 20 individuals criminally charged. Over 300 servers worldwide were taken down, 650 domains were neutralised and 3.5 million euros in cryptocurrency were seized. The actions follow efforts in May 2024, which had been the largest-ever operation against botnets. In total, 21.2 million euros have been seized during the an operation started in 2024. Context The malware taken down this week is known as "initial access malware." It is used for initial infection, helping cybercriminals to enter victims' systems unnoticed and load more malware onto their devices, such as ransomware. What's next Operation Endgame will continue with follow-up actions announced on the dedicated website from the international coalition. Several key suspects behind the malware operations are subject to international and public appeals. The German authorities will include eighteen of them on the EU Most Wanted list on Friday.


AsiaOne
24-05-2025
- AsiaOne
EU and US authorities take down malware network, Digital News
PARIS — European, American and Canadian authorities have taken down over 300 servers worldwide and issued international arrest warrants against 20 suspects in a crackdown on malware, EU agency for criminal justice co-operation Eurojust said in a statement, the latest phase in Operation Endgame. By the numbers German, French, Dutch, Danish, British, American and Canadian authorities joined forces this week against the world's most dangerous malware variants and the perpetrators behind them. More than three dozen suspects were identified and 20 individuals criminally charged. Over 300 servers worldwide were taken down, 650 domains were neutralised and 3.5 million euros (S$5.12 million) in cryptocurrency were seized. The actions follow efforts in May 2024, which had been the largest-ever operation against botnets. In total, 21.2 million euros have been seized during the operation started in 2024. Context The malware taken down this week is known as "initial access malware." It is used for initial infection, helping cybercriminals to enter victims' systems unnoticed and load more malware onto their devices, such as ransomware. What's next Operation Endgame will continue with follow-up actions announced on the dedicated website from the international coalition. Several key suspects behind the malware operations are subject to international and public appeals. The German authorities will include eighteen of them on the EU Most Wanted list on Friday (May 23). [[nid:717098]]


Time of India
24-05-2025
- Time of India
EU, US authorities take down malware network
European, American and Canadian authorities have taken down over 300 servers worldwide and issued international arrest warrants against 20 suspects in a crackdown on malware, EU agency for criminal justice cooperation Eurojust said in a statement, the latest phase in Operation Endgame . By the numbers German, French, Dutch, Danish, British, American and Canadian authorities joined forces this week against the world's most dangerous malware variants and the perpetrators behind them. Play Video Pause Skip Backward Skip Forward Unmute Current Time 0:00 / Duration 0:00 Loaded : 0% 0:00 Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time - 0:00 1x Playback Rate Chapters Chapters Descriptions descriptions off , selected Captions captions settings , opens captions settings dialog captions off , selected Audio Track default , selected Picture-in-Picture Fullscreen This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color White Black Red Green Blue Yellow Magenta Cyan Opacity Opaque Semi-Transparent Text Background Color Black White Red Green Blue Yellow Magenta Cyan Opacity Opaque Semi-Transparent Transparent Caption Area Background Color Black White Red Green Blue Yellow Magenta Cyan Opacity Transparent Semi-Transparent Opaque Font Size 50% 75% 100% 125% 150% 175% 200% 300% 400% Text Edge Style None Raised Depressed Uniform Drop shadow Font Family Proportional Sans-Serif Monospace Sans-Serif Proportional Serif Monospace Serif Casual Script Small Caps Reset restore all settings to the default values Done Close Modal Dialog End of dialog window. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Buy Brass Idols - Handmade Brass Statues for Home & Gifting Luxeartisanship Buy Now Undo More than three dozen suspects were identified and 20 individuals criminally charged. Over 300 servers worldwide were taken down, 650 domains were neutralised and 3.5 million euros in cryptocurrency were seized. The actions follow efforts in May 2024, which had been the largest-ever operation against botnets. Live Events In total, 21.2 million euros have been seized during the an operation started in 2024. Discover the stories of your interest Blockchain 5 Stories Cyber-safety 7 Stories Fintech 9 Stories E-comm 9 Stories ML 8 Stories Edtech 6 Stories Context The malware taken down this week is known as " initial access malware ." It is used for initial infection, helping cybercriminals to enter victims' systems unnoticed and load more malware onto their devices, such as ransomware. What's next Operation Endgame will continue with follow-up actions announced on the dedicated website from the international coalition. Several key suspects behind the malware operations are subject to international and public appeals. The German authorities will include eighteen of them on the EU Most Wanted list on Friday.


Shafaq News
23-05-2025
- Shafaq News
Global cybercrime sweep seizes €3M, nets 20 suspects
Shafaq News/ International law enforcement agencies dismantled several of the world's most dangerous malware operations in a coordinated crackdown conducted between May 19 and 22. According to a report from the European Union Agency for Criminal Justice Cooperation (Eurojust), authorities from Germany, France, the Netherlands, Denmark, the United Kingdom, the United States, and Canada collaborated under Operation Endgame 2.0—an extension of a similar 2024 campaign targeting cybercriminal botnets. In total, 37 suspects were identified in the latest phase. German authorities also announced that 18 of the most prominent individuals involved will be listed on the EU's Most Wanted website beginning May 23, as part of ongoing public appeals. Since the launch of Operation Endgame in 2024, a total of €21.2M in cryptocurrency has been seized. The operation took down more than 300 servers and neutralized 650 domains linked to major malware variants including Bumblebee, Qakbot, Trickbot, HijackLoader, and WarmCookie. 🌐 Operation Endgame 2.0 🌐Eurojust & @Europol supported coordinated actions by authorities around the globe to target some of the most dangerous malware variants.🇩🇪 🇫🇷 🇳🇱 🇩🇰 🇬🇧 🇺🇸 🇨🇦Full story 👉 — Eurojust (@Eurojust) May 23, 2025


New Straits Times
23-05-2025
- New Straits Times
Europol: Global anti-malware crackdown leads to 20 arrest warrants
THE HAGUE: A coordinated international operation this week disrupted some of the world's "most dangerous malware" and led to the issuance of 20 arrest warrants, European Union anti-crime bodies Europol and Eurojust said today. Authorities took down more than 300 servers worldwide, neutralised 650 domains and seized €3.5 million in cryptocurrency, they said. The coordinated crackdown has dealt "a direct blow to the ransomware kill chain", breaking it "at its source", said Europol, the European Union's criminal police agency. The software taken down, known as "initial access malware", is used "for initial infection, helping cybercriminals to enter victims' systems unnoticed and load more malware onto their devices, such as ransomware", the Hague-based agencies said. The crackdown -- involving authorities from Britain, Canada, Denmark, France, Germany, the Netherlands and the United States -- is a continuation of Operation Endgame, the largest-ever police operation against botnets. Between Monday and yesterday, the operation enabled the countries involved "to take action against the world's most dangerous malware variants and the perpetrators behind them", said Eurojust, the EU Agency for Criminal Justice Cooperation. "Thirty-seven suspects were identified,and international arrest warrants were obtained against 20 individuals criminally charged." In total, "€3.5 million in cryptocurrency" were seized, the agencies added, bringing the total amount of cryptocurrency seized during Endgame to €21.2 million. During the first phase of Endgame, in May 2024, four people were arrested and 100 servers were neutralised, they said. "This year during Endgame 2.0, the measures targeted the successor groups of malware taken down by the authorities and other relevant variants -- Bumblebee, Lactrodectus, Qakbot, DanaBot, HijackLoader, Trickbot and WarmCookie. "As these variants are at the beginning of the cyberattack chain, disrupting them damages the entire 'cybercrime as a service' ecosystem," they said. Such malware enables users to spy on data or encrypt a system in order to extort a ransom. About 50 of the servers neutralised this week were in Germany, the German authorities said. "In Germany, investigations focused particularly on suspicions of organised extorsion and membership of a foreign criminal organisation," according to the federal police and the Frankfurt public prosecutor's office in charge of combatting cybercrime. German authorities also obtained international arrest warrants for the 20 people, "most of them Russian nationals", and launched search operations, they added.