#operationendgame

2025-11-15

Major APT activity, AI-enabled attacks, GitHub credential leaks, and global takedowns (Rhadamanthys, VenomRAT, Elysium) dominate this week’s cybersecurity landscape.

Full story:
technadu.com/top-global-cybers

#CyberSecurity #APT #ThreatIntel #OperationEndgame

Top Global Cybersecurity News of the Week: Major APT Activity and Worldwide Law-Enforcement Takedowns
2025-11-14

Operation Endgame 3.0 disrupted major components of three malware ecosystems - Rhadamanthys, VenomRAT, and the Elysium botnet.

1,025+ servers were taken down across 11 countries with support from more than 30 cybersecurity organisations.

A rare example of coordinated action targeting the infrastructure layer of cyber-crime: botnets, RATs, and infostealers.
What’s your assessment - sustained impact or short-term setback?

Follow for more threat-intel updates.

#infosec #ThreatIntel #OperationEndgame #Malware #BlueTeam #IncidentResponse #CyberDefense #TechNadu

2025-11-13

Operation Endgame

Gestern noch den Counter veröffentlicht, heute ist das Ergebnis verfügbar: In einer koordinierten Einsatzphase der Operation Endgame, die vom Europol-Hauptquartier in Den Haag aus gesteuert wurde, wurden die Infostealer‑Plattform Rhadamanthys, der Remote‑Access‑Trojaner VenomRAT und das Botnet Elysium vollständig zerstört, sagt Europol.
Mehr: maniabel.work/archiv/209
#Botnet #infosec #infosecnews #Europol #OperationEndgame #BeDiS

TechCrunch | Startup and Technology Newstechcrunch.com@web.brid.gy
2025-11-13
The Spamhaus Projectspamhaus@infosec.exchange
2025-11-13

🔥 Operation Endgame 3.0 is here! This phase targets the notorious information and credential stealer #Rhadamanthys. It's another major international effort that’s seen 1,025 servers taken down and 20 domains seized. 💪

👏 Excellent work by @Europol and all partners involved — the takedown of Rhadamanthys marks a significant win for the global cybersecurity community.

As with earlier phases of #OperationEndgame, Spamhaus is providing remediation support. Those affected will be contacted in due course with guidance on next steps.

Operation Endgame website 👉 operation-endgame.com

Europol press release ⤵️
europol.europa.eu/media-press/

2025-11-13

#OperationEndgame: Authorities shut down infrastructure for Rhadamanthys Infostealer, VenomRAT and the Elysium botnet, seize 1025 servers and arrest one key suspect.

Read: hackread.com/operation-endgame

#CyberCrime #Malware #Rhadamanthys #Infostealer #CyberSecurity

2025-11-13

Proofpoint is proud to have assisted law enforcement in the #OperationEndgame investigation that led to the November 13, 2025 disruption of #Rhadamanthys and #VenomRAT, both #malware used by multiple cybercriminals.

• Rhadamanthys: brnw.ch/21wXs1N
• VenomRAT: brnw.ch/21wXs1O

---

Since May 2024, Operation Endgame—a global law enforcement and private sector effort that includes Proofpoint—has significantly disrupted the #malware and #botnet ecosystem.

👉 #Europol called the May 2024 Operation Endgame actions “the largest ever operation against botnets.”

👉 In May 2025, additional malware families and their creators, including #DanaBot, were taken down.

---

Each disruption forces threat actors to adapt and invest time and resources to retool their attack chains.

With our unique visibility and leading detection capabilities, Proofpoint researchers will continue monitoring the threat landscape and provide insight into the biggest cyber threats to society.

Distribution of VenomRAT by threat actor.Timeline of Rhadamanthys campaigns.
AllAboutSecurityallaboutsecurity
2025-11-13

BKA & internationale Partner stoppen Rhadamanthys und VenomRAT – Operation Endgame erschüttert Cybercrime-Ökosystem

all-about-security.de/bka-inte

2025-11-13

And it's out!

End of the game for cybercrime infrastructure: 1025 servers taken down

Between 10 and 13 November 2025, the latest phase of Operation Endgame was coordinated from Europol’s headquarters in The Hague. The actions targeted one of the biggest infostealer Rhadamanthys, the Remote Access Trojan VenomRAT, and the botnet Elysium, all of which played a key role in international cybercrime. Authorities took down these three large cybercrime enablers. The main suspect for VenomRAT was arrested in Greece on 3 November 2025.

#OperationEndgame #rhadamanthys #infostealer #VenomRAT #Elysium

2025-11-13

Less than 10 minutes left on the Operation Endgame's counter. Wonder what they gonna announce. Maybe just the takedown of rhadamanthys infostealer infra.

#OperationEndgame #rhadamanthys #infostealer

Screenshot of Operation Endgame shows less than 10 minutes left on the counter
2025-11-12

Rhadamanthys Infostealer’s TOR infrastructure goes offline in apparent law enforcement takedown - possibly tied to Operation Endgame.
technadu.com/rhadamanthys-info

#CyberSecurity #Rhadamanthys #Infostealer #LawEnforcement #OperationEndgame

Rhadamanthys Infostealer Infrastructure Disrupted in Apparent Law Enforcement Takedown
2025-07-11

In May 2025, #ESET participated in operations that largely disrupted the infrastructure of two notorious infostealers: #LummaStealer and #Danabot.
As part of the Lumma Stealer disruption effort, carried out in conjunction with Microsoft, BitSight, Lumen, Cloudflare, CleanDNS, and GMO Registry, ESET supplied technical analysis and statistical information.
Danabot was targeted by the #FBI and #DCIS, alongside #OperationEndgame led by #Europol and #Eurojust. ESET participated together with several other companies. We provided the analysis of the malware’s backend infrastructure and identified its C&C servers.
Before these takedowns, both infostealers were on the rise: in H1 2025, Lumma Stealer detections grew by 21%, while Danabot’s numbers increased by more than 50%.
For a time, Lumma Stealer was the primary payload of HTML/FakeCaptcha trojan, used in the #ClickFix social engineering attacks that we also cover in this issue of the #ESETThreatReport. In recent months, we have seen Danabot being delivered via ClickFix as well.
For more details on these two operations and on the ClickFix attacks, read the latest #ESETThreatReport: welivesecurity.com/en/eset-res

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-06-01

🚨 Authorities just dismantled major malware evasion services used by cybercriminals! Operation Endgame took down AVCheck & more, striking at the heart of cybercrime tools that help malware dodge antivirus defenses. Huge win for cybersecurity! 🔒🌐
Read more: cyberinsider.com/authorities-t
#CyberSecurity #OperationEndgame #Malware #LawEnforcement #AVCheck #newz

𝚛𝚒𝚌𝚑𝚊𝚛𝚍 𝚜𝚎𝚖𝚖𝚕𝚎𝚛rennsemmler.bsky.social@bsky.brid.gy
2025-05-30

Fahndung BKA: »Vitalii Nikolaevich KOVALEV (oder: Vitaly Nikolayevich, Vitaliy Nikolayevich) steht im Verdacht, als Gründer der Gruppierung hinter der Schadsoftware #Trickbot einen wesentlichen Tatbeitrag zur Durchführung von globalen Cyberattacken geleistet zu haben.« 🇷🇺 #Stern #OperationEndgame

bka.de/DE/IhreSicherh...

2025-05-26

Global operation dismantles DanaBot malware network, indicting 16 and recovering $50M+ in losses. #Cybersecurity #DanaBot #OperationEndgame

More details: cyberscoop.com/danabot-malware - flagthis.com/news/15679

Mark ArjomandiNewOrder2024
2025-05-24

botnet disrupted, leader indicted: , mounted by law enforcement and judicial authorities from the US, Canada and the EU, continues to deliver positive results by disrupting the DanaBot botnet and indicting the leaders of both the DanaBot and Qakbot Malware-as-a-Service operations. (May 2025)

helpnetsecurity.com/2025/05/23

IT InsightsITinsights
2025-05-24

🌐🚨 Grote klap voor cybercriminelen! 300 servers en 650 domeinen in beslag genomen tijdens . Samen staan we sterk tegen ransomware! 💪🔒  
itinsights.nl/cybersecurity/ha

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst