Zürcher Nachrichten - Four arrested in international anti-malware sweep

EUR -
AED 3.867372
AFN 71.880601
ALL 97.950923
AMD 410.27558
ANG 1.903403
AOA 960.287882
ARS 1051.622766
AUD 1.628691
AWG 1.890041
AZN 1.79197
BAM 1.952828
BBD 2.132455
BDT 126.207917
BGN 1.955904
BHD 0.396397
BIF 3118.953099
BMD 1.052947
BND 1.415845
BOB 7.297893
BRL 6.103883
BSD 1.056093
BTN 88.732254
BWP 14.438026
BYN 3.45624
BYR 20637.770278
BZD 2.12886
CAD 1.483803
CDF 3016.694234
CHF 0.934952
CLF 0.037409
CLP 1026.907095
CNY 7.615438
CNH 7.619601
COP 4737.290066
CRC 537.481978
CUC 1.052947
CUP 27.903108
CVE 110.097437
CZK 25.267474
DJF 188.063776
DKK 7.456521
DOP 63.633153
DZD 140.236567
EGP 51.985875
ERN 15.794212
ETB 127.896647
FJD 2.396456
FKP 0.831109
GBP 0.834018
GEL 2.879749
GGP 0.831109
GHS 16.871323
GIP 0.831109
GMD 74.759236
GNF 9101.148477
GTQ 8.156586
GYD 220.853871
HKD 8.197543
HNL 26.671407
HRK 7.510947
HTG 138.838694
HUF 408.318268
IDR 16740.074654
ILS 3.942356
IMP 0.831109
INR 88.950633
IQD 1383.494386
IRR 44321.194656
ISK 144.938103
JEP 0.831109
JMD 167.724731
JOD 0.74664
JPY 162.512439
KES 136.77184
KGS 91.008714
KHR 4266.506576
KMF 491.27896
KPW 947.652318
KRW 1469.835727
KWD 0.323824
KYD 0.88016
KZT 524.841216
LAK 23206.680517
LBP 94575.360722
LKR 308.540416
LRD 194.324248
LSL 19.213857
LTL 3.109081
LVL 0.636918
LYD 5.15815
MAD 10.528975
MDL 19.189794
MGA 4912.523369
MKD 61.516375
MMK 3419.932287
MNT 3577.915423
MOP 8.468611
MRU 42.159835
MUR 49.709439
MVR 16.267471
MWK 1831.312827
MXN 21.432483
MYR 4.707201
MZN 67.270947
NAD 19.213857
NGN 1754.021264
NIO 38.860856
NOK 11.694156
NPR 141.971925
NZD 1.795062
OMR 0.404884
PAB 1.056093
PEN 4.009298
PGK 4.246537
PHP 61.841188
PKR 293.231016
PLN 4.325698
PYG 8240.458408
QAR 3.85004
RON 4.974029
RSD 116.819207
RUB 105.320446
RWF 1450.492418
SAR 3.955012
SBD 8.834671
SCR 14.572883
SDG 633.347507
SEK 11.569065
SGD 1.413556
SHP 0.831109
SLE 23.791829
SLL 22079.786816
SOS 603.581377
SRD 37.185362
STD 21793.886595
SVC 9.240936
SYP 2645.56194
SZL 19.206768
THB 36.754195
TJS 11.258265
TMT 3.695846
TND 3.332029
TOP 2.466106
TRY 36.270846
TTD 7.171086
TWD 34.196366
TZS 2809.224492
UAH 43.623507
UGX 3876.100756
USD 1.052947
UYU 45.321024
UZS 13518.425588
VES 48.153511
VND 26734.33609
VUV 125.008039
WST 2.939399
XAF 654.960181
XAG 0.034817
XAU 0.000411
XCD 2.845643
XDR 0.795589
XOF 654.960181
XPF 119.331742
YER 263.105249
ZAR 19.152072
ZMK 9477.791859
ZMW 28.99587
ZWL 339.048654
  • NGG

    0.3800

    62.75

    +0.61%

  • RELX

    -1.5000

    44.45

    -3.37%

  • GSK

    -0.6509

    33.35

    -1.95%

  • RBGPF

    61.8400

    61.84

    +100%

  • AZN

    -1.8100

    63.23

    -2.86%

  • CMSC

    0.0200

    24.57

    +0.08%

  • VOD

    0.0900

    8.77

    +1.03%

  • BTI

    0.9000

    36.39

    +2.47%

  • RIO

    0.5500

    60.98

    +0.9%

  • RYCEF

    0.0400

    6.82

    +0.59%

  • SCS

    -0.0400

    13.23

    -0.3%

  • BCC

    -0.2600

    140.09

    -0.19%

  • CMSD

    0.0822

    24.44

    +0.34%

  • BCE

    -0.0200

    26.82

    -0.07%

  • BP

    -0.0700

    28.98

    -0.24%

  • JRI

    0.0235

    13.1

    +0.18%

Four arrested in international anti-malware sweep
Four arrested in international anti-malware sweep / Photo: Remko de Waal - ANP/AFP/File

Four arrested in international anti-malware sweep

Authorities arrested four people and took down or disrupted more than 100 servers in the "largest ever" operation against botnets that deploy ransomware, Europol said Thursday.

Text size:

Dubbed Operation Endgame, the sweep was initiated and led by France, Germany and the Netherlands, with a French official saying they wanted to act before this summer's Paris Olympics.

The attacks cost the victims, which were mainly companies and national institutions, hundreds of millions of euros, according to Dutch police, adding that the systems of millions of individuals were infected.

The May 27-29 operation led to one arrest in Armenia and three in Ukraine, with searches in both countries as well as in the Netherlands and Portugal, Europol said.

The servers were located in Bulgaria, Canada, Germany, Lithuania, the Netherlands, Romania, Switzerland, Britain, the United States and Ukraine.

In addition to the four arrests, eight fugitive suspects linked to the case will be added to Europe's Most Wanted list.

One of the suspects earned at least 69 million euros ($75 million) in cryptocurrency by renting out criminal infrastructure sites to disseminate ransomware, Europol said.

"This is the largest ever operation against botnets, which play a major role in the deployment of ransomware," the agency based in The Hague said.

A botnet is a network of computers infected by malware and controlled by hackers.

Authorities targeted malware "droppers" -- a type of software used to insert malicious software into a system -- named IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee and Trickbot.

Trickbot was used to launch ransomware attacks on US hospitals during the Covid pandemic.

- Pre-Olympics sting -

The operation had "a global impact on the dropper ecosystem", Europol said.

Droppers allow criminals to bypass security measures and deploy viruses, ransomware or spyware, the agency said.

The malicious software is generally installed via emails with infected links or Word and PDF attachments, according to Eurojust, the European Union Agency for Criminal Justice Cooperation.

The agency said the operation was ongoing, with more arrests expected.

"We wanted to do this operation before the Olympic Games," Nicolas Guidoux, head of the French police's cybercrime unit, told AFP.

He said it was "important to weaken the attacking infrastructure" and "limit their resources" before the global event, as authorities fear that it could be targeted by numerous cyberattacks.

Endgame also involved authorities from Denmark, Britain and the United States, with additional support from Armenia, Bulgaria, Lithuania, Portugal, Romania, Switzerland and Ukraine.

- SystemBC and Pikabot -

The investigation was launched in 2022.

German cybercrime prosecutor Benjamin Krause said health, education and public administration institutions were targeted.

Hackers would encrypt files or whole systems to block access to them and then demand money to unlock them, Krause said at a news conference, adding that such attacks threatened "the existence of companies".

French investigators identified the administrator of the SystemBC dropper, which Europol said "facilitated anonymous communication between an infected system" and "command-and-control servers".

The administrator of Pikabot -- a Trojan horse allowing the deployment of ransomware, the remote takeover of computers and data theft -- was also identified by French authorities.

French police participated in the suspect's arrest and house search in Ukraine, with authorisation from local authorities, said Paris prosecutor Laure Beccuau.

Guidoux said the number of victims will be known only after the dismantled servers are analysed.

Cybersecurity experts said Operation Endgame helped to destabilise a criminal ecosystem that is difficult to crack.

"The dropper network is a piece of infrastructure that makes life easier for many cybercriminal groups," said Jerome Saiz, founder of cybersecurity firm OPFOR Intelligence.

B.Brunner--NZN