Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

Posted on May 23, 2025May 23, 2025 By CWS

Might 23, 2025Ravie LakshmananRansomware / Darkish Internet
As a part of the most recent “season” of Operation Endgame, a coalition of legislation enforcement businesses have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants in opposition to 20 targets.
Operation Endgame, first launched in Might 2024, is an ongoing legislation enforcement operation focusing on companies and infrastructures aiding in or immediately offering preliminary or consolidating entry for ransomware. The earlier version centered on dismantling the preliminary entry malware households which have been used to ship ransomware.
The most recent iteration, per Europol, focused new malware variants and successor teams that re-emerged after final yr’s takedowns equivalent to Bumblebee, Lactrodectus, QakBot, HijackLoader, DanaBot, TrickBot, and WARMCOOKIE. The interplay motion was carried out between Might 19 and 22, 2025.
“As well as, €3.5 million in cryptocurrency was seized in the course of the motion week, bringing the full quantity seized in the course of the Operation Endgame to greater than €21.2 million,” the company stated.

Europol famous that the malware variants are supplied as a service to different risk actors and are used to conduct large-scale ransomware assaults. Moreover, worldwide arrest warrants have been issued in opposition to 20 key actors who’re believed to be offering or working preliminary entry companies to ransomware crews.
“This new section demonstrates legislation enforcement’s capacity to adapt and strike once more, at the same time as cybercriminals retool and reorganize,” Europol Govt Director Catherine De Bolle stated. “By disrupting the companies criminals depend on to deploy ransomware, we’re breaking the kill chain at its supply.”

Germany’s Federal Felony Police Workplace (aka Bundeskriminalamt or BKA) has revealed that prison proceedings have been initiated in opposition to 37 recognized actors. A number of the people who’ve been added to the E.U. Most Wished checklist are listed under –

Roman Mikhailovich Prokop (aka carterj), 36, a member of the QakBot group
Danil Raisowitsch Khalitov (aka dancho), 37, a member of the QakBot group
Iskander Rifkatovich Sharafetdinov (aka alik, gucci), 32, a member of the TrickBot group
Mikhail Mikhailovich Tsarev (aka mango), 36, a member of the TrickBot group
Maksim Sergeevich Galochkin (aka bentley, manuel, Max17, volhvb, crypt), 43, a member of the TrickBot group
Vitalii Nikolaevich Kovalev (aka stern, ben, Grave, Vincent, Bentley, Bergen, Alex Konor), 36, a member of the TrickBot group

The disclosure comes as Europol took the wraps off a large-scale legislation enforcement operation that resulted in 270 arrests of darkish internet distributors and patrons throughout 10 international locations: the US (130), Germany (42), the UK (37), France (29), South Korea (19), Austria (4), the Netherlands (4), Brazil (3), Switzerland (1), and Spain (1).
The suspects, Europol famous, had been recognized primarily based on intelligence gathered from the takedowns of the darkish internet marketplaces Nemesis, Tor2Door, Bohemia, and Kingdom Markets. A number of suspects are alleged to have performed hundreds of gross sales on illicit marketplaces, usually utilizing encryption instruments and cryptocurrencies to hide their digital footprints.

“Often called Operation RapTor, this worldwide sweep has dismantled networks trafficking in medication, weapons, and counterfeit items, sending a transparent sign to criminals hiding behind the phantasm of anonymity,” Europol stated.

Together with the arrests, €184 million in money and cryptocurrencies, 2 tons of medication, 180 firearms, 12,500 counterfeit merchandise, and greater than 4 tons of unlawful tobacco have been seized by authorities. The joint motion follows Operation SpecTor in Might 2023, which led to the arrest of 288 darkish internet distributors and patrons and the seizure of €50.8 million in money and cryptocurrency.
“With conventional marketplaces beneath growing strain, prison actors are shifting to smaller, single-vendor retailers — websites run by particular person sellers to keep away from market charges and reduce publicity,” Europol stated. “Unlawful medication stay the highest commodity bought on the darkish internet, however 2023 additionally noticed a surge in prescription drug trafficking and an increase in fraudulent companies, together with pretend hitmen and bogus listings designed to rip-off patrons.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:3.5M, Europol, Networks, Ransomware, Seized, Servers, Strikes, Worldwide

Post navigation

Previous Post: Companies Warned of Commvault Vulnerability Exploitation
Next Post: Russian Qakbot Gang Leader Indicted in US

Related Posts

Secure Vibe Coding: The Complete New Guide The Hacker News
Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News
Why More Security Leaders Are Selecting AEV The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover
  • Exploits, Technical Details Released for CitrixBleed2 Vulnerability
  • PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore
  • Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover
  • Exploits, Technical Details Released for CitrixBleed2 Vulnerability
  • PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News