Zürcher Nachrichten - Four arrested in major international anti-malware sweep

EUR -
AED 3.869613
AFN 71.922253
ALL 98.007682
AMD 410.513317
ANG 1.904506
AOA 960.844526
ARS 1051.657842
AUD 1.629706
AWG 1.891136
AZN 1.78986
BAM 1.953959
BBD 2.13369
BDT 126.281049
BGN 1.957037
BHD 0.396626
BIF 3120.760397
BMD 1.053558
BND 1.416666
BOB 7.302122
BRL 6.107421
BSD 1.056705
BTN 88.78367
BWP 14.446392
BYN 3.458243
BYR 20649.728972
BZD 2.130094
CAD 1.483947
CDF 3018.44312
CHF 0.936055
CLF 0.037431
CLP 1027.502144
CNY 7.619854
CNH 7.626203
COP 4740.03512
CRC 537.793425
CUC 1.053558
CUP 27.919276
CVE 110.161234
CZK 25.269569
DJF 188.172751
DKK 7.458892
DOP 63.670026
DZD 140.317828
EGP 51.991803
ERN 15.803364
ETB 127.970758
FJD 2.397845
FKP 0.831591
GBP 0.834997
GEL 2.881437
GGP 0.831591
GHS 16.881099
GIP 0.831591
GMD 74.802359
GNF 9106.422199
GTQ 8.161312
GYD 220.981846
HKD 8.203553
HNL 26.686862
HRK 7.515299
HTG 138.919145
HUF 407.90432
IDR 16749.774802
ILS 3.950108
IMP 0.831591
INR 89.002175
IQD 1384.296061
IRR 44346.873229
ISK 145.022369
JEP 0.831591
JMD 167.82192
JOD 0.747077
JPY 162.644533
KES 136.851093
KGS 91.131247
KHR 4268.978832
KMF 491.563658
KPW 948.201441
KRW 1470.687417
KWD 0.324011
KYD 0.88067
KZT 525.145339
LAK 23220.127783
LBP 94630.163047
LKR 308.719202
LRD 194.43685
LSL 19.224991
LTL 3.110882
LVL 0.637287
LYD 5.161138
MAD 10.535076
MDL 19.200914
MGA 4915.369964
MKD 61.552021
MMK 3421.91399
MNT 3579.98867
MOP 8.473518
MRU 42.184265
MUR 49.738625
MVR 16.277514
MWK 1832.373994
MXN 21.440687
MYR 4.709931
MZN 67.321197
NAD 19.224991
NGN 1755.037163
NIO 38.883374
NOK 11.686851
NPR 142.054192
NZD 1.795968
OMR 0.405118
PAB 1.056705
PEN 4.011621
PGK 4.248998
PHP 61.877023
PKR 293.400931
PLN 4.322151
PYG 8245.233396
QAR 3.852271
RON 4.976911
RSD 116.886898
RUB 105.330958
RWF 1451.332916
SAR 3.957304
SBD 8.83979
SCR 14.581462
SDG 633.712788
SEK 11.571755
SGD 1.414032
SHP 0.831591
SLE 23.842835
SLL 22092.581096
SOS 603.931127
SRD 37.206907
STD 21806.515209
SVC 9.24629
SYP 2647.094929
SZL 19.217898
THB 36.650077
TJS 11.264789
TMT 3.697987
TND 3.33396
TOP 2.467539
TRY 36.300796
TTD 7.175241
TWD 34.216183
TZS 2810.852316
UAH 43.648785
UGX 3878.346788
USD 1.053558
UYU 45.347285
UZS 13526.25893
VES 48.181414
VND 26749.82748
VUV 125.080475
WST 2.941102
XAF 655.339702
XAG 0.034643
XAU 0.00041
XCD 2.847292
XDR 0.79605
XOF 655.339702
XPF 119.331742
YER 263.257661
ZAR 19.162264
ZMK 9483.276853
ZMW 29.012671
ZWL 339.245118
  • BCC

    -0.2600

    140.09

    -0.19%

  • BTI

    0.9000

    36.39

    +2.47%

  • RIO

    0.5500

    60.98

    +0.9%

  • GSK

    -0.6509

    33.35

    -1.95%

  • SCS

    -0.0400

    13.23

    -0.3%

  • CMSC

    0.0200

    24.57

    +0.08%

  • CMSD

    0.0822

    24.44

    +0.34%

  • RBGPF

    61.8400

    61.84

    +100%

  • NGG

    0.3800

    62.75

    +0.61%

  • BP

    -0.0700

    28.98

    -0.24%

  • JRI

    0.0235

    13.1

    +0.18%

  • VOD

    0.0900

    8.77

    +1.03%

  • RELX

    -1.5000

    44.45

    -3.37%

  • RYCEF

    0.0400

    6.82

    +0.59%

  • AZN

    -1.8100

    63.23

    -2.86%

  • BCE

    -0.0200

    26.82

    -0.07%

Four arrested in major international anti-malware sweep
Four arrested in major international anti-malware sweep / Photo: Remko de Waal - ANP/AFP/File

Four arrested in major international anti-malware sweep

Authorities arrested four people and took down or disrupted more than 100 servers in the "largest ever" operation against botnets that deploy ransomware, Europol said Thursday.

Text size:

Dubbed Operation Endgame, the sweep was initiated and led by France, Germany and the Netherlands, with a French official saying they wanted to act before this summer's Paris Olympics.

The attacks cost the victims, which were mainly companies and national institutions, hundreds of millions of euros, according to Dutch police, adding that the systems of millions of individuals were infected.

The May 27-29 operation led to one arrest in Armenia and three in Ukraine, with searches in both countries as well as in the Netherlands and Portugal, Europol said.

The servers were located in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, Britain, the United States and Ukraine.

In addition to the four arrests, eight fugitive suspects linked to the case will be added to Europe's Most Wanted list.

One of the suspects earned at least 69 million euros ($75 million) in cryptocurrency by renting out criminal infrastructure sites to disseminate ransomware, Europol said.

"This is the largest ever operation against botnets, which play a major role in the deployment of ransomware," the agency based in The Hague said.

A botnet is a network of computers infected by malware and controlled by hackers.

Authorities targeted malware "droppers" -- a type of software used to insert malicious software into a system -- named IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee and Trickbot.

Trickbot was used to launch ransomware attacks on US hospitals during the Covid pandemic.

- Pre-Olympics sting -

The operation had "a global impact on the dropper ecosystem", Europol said.

Droppers allow criminals to bypass security measures and deploy viruses, ransomware or spyware, the agency said.

The malicious software is generally installed via emails with infected links or Word and PDF attachments, according to Eurojust, the European Union Agency for Criminal Justice Cooperation.

The agency said the operation was ongoing, with more arrests expected.

"We wanted to do this operation before the Olympic Games," Nicolas Guidoux, head of the French police's cybercrime unit, told AFP.

He said it was "important to weaken the attacking infrastructure" and "limit their resources" before the global event, as authorities fear that it could be targeted by numerous cyberattacks.

Endgame also involved authorities from Denmark, Britain and the United States, with additional support from Armenia, Bulgaria, Lithuania, Portugal, Romania, Switzerland and Ukraine.

- SystemBC and Pikabot -

The investigation was launched in 2022.

German cybercrime prosecutor Benjamin Krause said health, education and public administration institutions were targeted.

Hackers would encrypt files or whole systems to block access to them and then demand money to unlock them, Krause said at a news conference, adding that such attacks threatened "the existence of companies".

French investigators identified the administrator of the SystemBC dropper, which Europol said "facilitated anonymous communication between an infected system" and "command-and-control servers".

The administrator of Pikabot -- a Trojan horse allowing the deployment of ransomware, the remote takeover of computers and data theft -- was also identified by French authorities.

French police participated in the suspect's arrest and house search in Ukraine, with authorisation from local authorities, said Paris prosecutor Laure Beccuau.

Guidoux said the number of victims will be known only after the dismantled servers are analysed.

B.Brunner--NZN