Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Operation Endgame Hits Three Major Malware Networks in Global Sweep
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Operation Endgame Hits Three Major Malware Networks in Global Sweep

Highlights

  • Law enforcement dismantled major malware networks Rhadamanthys, VenomRAT, and Elysium.

  • Operation Endgame required collaboration between multiple countries and private companies.

  • Many victims remain unaware; further actions are expected as investigations continue.

Kaan Demirel
Last updated: 13 November, 2025 - 6:20 pm 6:20 pm
Kaan Demirel 2 hours ago
Share
SHARE

A coordinated international law enforcement operation recently targeted prominent cybercriminal infrastructure, affecting digital security worldwide. Through actions conducted between November 10 and 13, authorities struck at the heart of malware operations tied to Rhadamanthys, VenomRAT, and the Elysium botnet. These interconnected malware networks represent a significant threat to businesses and individuals alike, providing hackers with tools to compromise computers and access sensitive information. Experts point to the support of private cybersecurity partners and cross-border police collaboration as crucial elements of this campaign. Effective disruption of these botnets can limit further unauthorized access to personal, financial, and corporate data, making such actions critical to global cybersecurity.

Contents
Which Malware Were Targeted and How?What Role Did Private Sector and International Cooperation Play?How Are Victims Impacted and What’s Next?

Law enforcement agencies have repeatedly engaged in actions against digital criminal networks, yet previous efforts have often taken aim at single malware families or smaller groups. Past crackdowns, while impactful, have not focused on such a broad range of malware at once or involved this level of organizational coordination. Operation Endgame’s emphasis on both the infrastructure and those providing criminal services highlights a shift towards a more systematic and ongoing approach, involving both technical intervention and outreach to affected users. In this operation, the scale—over 1,000 servers seized—and comprehensive involvement of major private cybersecurity firms marks a clear advancement compared to earlier initiatives, which often centered on takedowns led almost exclusively by law enforcement.

Which Malware Were Targeted and How?

Authorities concentrated efforts on neutralizing Rhadamanthys, a malware known for stealing credentials, the VenomRAT remote access tool, and the Elysium botnet, which fostered the spread of various malicious programs. Operation Endgame, guided from Europol headquarters, led to the seizure or disruption of 1,025 illicit servers and 20 internet domains. According to Europol, the main suspect responsible for VenomRAT was apprehended in Greece, and searches were conducted at 11 European locations. These actions disrupted the mechanisms that enabled cybercriminals to hijack computers and quietly gather data worldwide.

What Role Did Private Sector and International Cooperation Play?

Cybersecurity companies such as Crowdstrike, Proofpoint, Bitdefender, and the Shadowserver Foundation worked closely alongside law enforcement to provide intelligence and support. Their joint efforts facilitated identification and notification of victims, as well as forensic analysis of seized digital infrastructure. The Shadowserver Foundation specifically alerted national security teams and more than 10,000 network owners regarding ongoing infections. Law enforcement recognized the importance of this assistance, noting that cross-sector cooperation remains essential in disrupting increasingly globalized cyber threats.

How Are Victims Impacted and What’s Next?

The effect of dismantling these services was widespread: hundreds of thousands of computers were infected with Rhadamanthys, VenomRAT, or Elysium, and millions of credentials were stolen. Officials found that the main Rhadamanthys suspect had access to over 100,000 cryptocurrency wallets; potential cash losses reach into the millions of euros. Many victimized users remained unaware of breaches, leaving their data and devices vulnerable. Authorities have begun contacting victims and those identified as users of criminal services, seeking further information and highlighting the persistent need for vigilance.

“Operation Endgame shows how international collaboration can disrupt entire cybercrime supply chains,”

said a Europol spokesperson.

“This is not the final step—our investigations and actions will continue,”

representatives emphasized.

Sustained, internationally coordinated operations like Operation Endgame increasingly shape the landscape of cybersecurity. By combining technical dismantling of criminal infrastructure with public notifications and collaborative initiatives, investigators can more effectively mitigate risks posed by wide-reaching malware. For individuals and organizations, this underscores the importance of up-to-date security practices, robust monitoring, and responsiveness to breach alerts. These events also point to the growing requirement for governments, private companies, and the public to work together to minimize the threat of evolving cyberattacks. Periodic checks of accounts, monitoring for suspicious activities, and remaining informed about malware campaigns are practical steps for reducing risk on a personal and organizational level.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Google Targets Lighthouse Text Scammers with Civil Lawsuit

Amazon Exposes Early Zero-Day Attacks Targeting Cisco and Citrix

FBI Targets Youth Cybercrime as Maryland Man Faces Federal Charges

Microsoft Fixes 63 Security Flaws, One Zero-Day Under Active Attack

Amazon Engages Outside Experts to Test NOVA AI Model Security

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Ford CEO Confronts Competitive Gaps After Teardown of Tesla, Chinese EVs
Next Article Tesla Leads UK EV Charging Satisfaction Survey for Second Year

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

China Weighs Acceleration Limits for Electric Cars to Address Safety
Electric Vehicle
Neros Boosts Drone Production with Fresh $75 Million Investment
Robotics
Tesla Leads UK EV Charging Satisfaction Survey for Second Year
Electric Vehicle
Ford CEO Confronts Competitive Gaps After Teardown of Tesla, Chinese EVs
Electric Vehicle
Tesla Surpasses 150,000 Cars on Australian Roads
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?