Article Details

Original Article Text

Click to Toggle View

Police detains Smokeloader malware customers, seizes servers. In follow-up activity for Operation Endgame, law enforcement tracked down Smokeloader botnet’s customers and detained at least five individuals. During Operation Endgame last year, more than 100 servers used by major malware loader operations (e.g. IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, SystemBC) were seized. In a press release today, Europol informs that the operation continues as law enforcement officers analyze the data from the seized servers and are tracking down customers of the malicious businesses. The agency did not provide any details about the detained individuals, and says that the investigation also led to interrogations and server takedowns. According to the investigators, Smokeloader was run by a threat actor using the alias ‘Superstar,’ who provided the botnet as a pay-per-install service that permitted customers access to the victims’ machines. “In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as ‘Superstar’, faced consequences such as arrests, house searches, arrest warrants or ‘knock and talks’” - Europol Smokeloader was used for various cybercriminal activities, from deploying ransomware and running cryptominers to accessing webcams and logging keystrokes. A database seized during Operation Endgame included customers registered for Smokeloader botnet services, allowing officers to track down cybercriminals by linking their online aliases to real-life individuals. Some of the suspects chose to cooperate with law enforcement and allowed the examination of digital evidence present on their personal devices. Since Operation Endgame continues, Europol set up a dedicated website to share the latest news on the investigation of criminal activities. Furthermore, to better understand the stages of the operation, Europol published a series of animated videos depicting officers’ activity and how they are tracking down Smokeloader affiliates and customers. European Union’s agency encourages anyone with information about the criminal activities investigated to contact authorities through the Operation Endgame website, which is also conveniently translated into Russian. Following the massive takedown of malware loader operations last year, a set of sanctions were imposed against six individuals involved in cyberattacks affecting systems relating to “critical infrastructure, critical state functions, the storage or processing of classified information and government emergency response teams in EU member states.” The U.S. Treasury also sanctioned cryptocurrency exchanges Cryptex and PM2BTC that multiple cybercrime groups, including Russian ransomware gangs, used to launder funds. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Operation Endgame Advances: Multiple Smokeloader Botnet Customers Detained

Law enforcement has detained at least five individuals linked to the Smokeloader botnet as part of the ongoing Operation Endgame.

The operation initially resulted in the seizure of over 100 servers used by major malware groups, including Smokeloader.

Europol revealed the continued effort involves analyzing data from seized servers to track down purchasers of these malicious services.

Smokeloader, managed by a threat actor known as 'Superstar', was a pay-per-install service allowing remote access to infected computers.

The botnet was utilized for diverse cybercrimes, including deploying ransomware, cryptocurrency mining, accessing webcams, and keystroke logging.

Some detained suspects have cooperated with authorities, permitting the examination of digital evidence on their personal devices.

Europol has established a dedicated website and released animated videos to enhance the public's understanding of the ongoing operations.

The European Union's agency is encouraging anyone with relevant information to contact them through the Operation Endgame website, with translations available in Russian.