Original Article Text

Click to Toggle View

Europol identifies 8 cybercriminals tied to malware loader botnets. Europol and German law enforcement have revealed the identities of eight cybercriminals linked to the various malware droppers and loaders disrupted as part of the Operation Endgame law enforcement operation. Operation Endgame, announced by Europol yesterday, led to the seizure of 100 servers used in multiple malware operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. The law enforcement crackdown also involved four arrests, one in Armenia and three in Ukraine. Yesterday, the Federal Criminal Police Office of Germany revealed the identities of eight cybercriminals of Russian descent, who are thought to have held central roles in the Smokeloader and Trickbot malware operations. The identity and criminal profiles of the eight men are summarized as follows: The authorities have no information about the current location and whereabouts of any of the eight cybercriminals. However, they are believed to reside in the Russian Federation, except for Kucherov, who, according to the investigation, lives in the United Arab Emirates. Europe's Most Wanted portal, which now lists the eight cybercriminals, requests the public to contribute information about the whereabouts of these persons, communication details by people who contacted them recently, and additional information on their online presence.

Daily Brief Summary

MALWARE // Europol Uncovers Identities in Malware Loader Botnet Operation

Europol, in collaboration with German law enforcement, has identified eight key figures linked to malware loader botnets.

The identification is part of Operation Endgame, which led to the seizure of 100 servers involved in malware operations such as IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC.

Four individuals were arrested during the crackdown, including one in Armenia and three in Ukraine.

The targeted criminals, of Russian descent, are central operatives in the Smokeloader and Trickbot malware campaigns.

Despite knowing the identities, current locations of these individuals remain unknown, though most are believed to reside in the Russian Federation.

One of the identified suspects is reportedly living in the United Arab Emirates.

The public has been urged to provide any information about the whereabouts of these criminals via Europe's Most Wanted portal.