Europol has announced a major crackdown on cybercrime as part of its ongoing Operation Endgame, targeting three powerful malware tools: the Rhadamanthys infostealer, the VenomRAT trojan, and the Elysium botnet.
More than 1,000 servers used by these malware families were disrupted. According to Europol, these servers were connected to hundreds of thousands of infected computers around the world, containing millions of stolen credentials. Many of the victims didn’t realize their systems were compromised.
Law enforcement conducted searches at 11 locations: in Germany, Greece, and the Netherlands. During the operation, 20 malicious domains were seized, and one suspect linked to VenomRAT was arrested in Greece.
The authorities say the main individual behind the infostealer had access to more than 100,000 cryptocurrency wallets belonging to victims, with potential value in the millions of euros. However, despite this access, the suspect had not yet converted the funds to steal crypto assets.
Rhadamanthys is particularly dangerous: it steals browser-resident data, login credentials, autofill information, and wallet data. It’s sold as “malware-as-a-service,” so other criminals can subscribe to it.
Meanwhile, VenomRAT gives attackers full remote control over infected machines, allowing them to steal files, browser data, wallet info, credit-card details, and more. It often spreads using fake antivirus software or phishing.
The Elysium botnet is also part of this ecosystem. It enables data theft, payload delivery, and assists other malware operations.
Europol says these arrests and takedowns are a big win—they not only disrupt specific malware operations, but also shake the trust among criminal affiliates who relied on those services. By taking out infrastructure, authorities are hitting the supply chain layer of cybercrime, not just individual attackers.
This isn’t the first phase of Operation Endgame. Previous efforts have already targeted other malware families, showing that law enforcement is focused on dismantling large-scale criminal infrastructure
Leave a comment