Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Counter Antivirus Service AVCheck Shut Down by Law Enforcement

Posted on June 2, 2025June 2, 2025 By CWS

Dutch authorities introduced the takedown of AVCheck, one of many largest counter antivirus (CAV) companies utilized by cybercriminals worldwide.

CAV companies corresponding to AVCheck play an vital function within the malware deployment course of, as they permit cybercriminals to check if their malware is detected by antivirus merchandise and scanners, earlier than utilizing it in real-world assaults.

Malware that may evade detection can then be deployed with out being seen to steal data, acquire and preserve entry to compromised methods, and encrypt knowledge or lock down total enterprise networks.

Cybercriminals usually use CAV companies together with crypting companies, which are supposed to make the malware tougher to detect.

AVCheck was taken down on Might 27, when authorities seized 4 domains and their related server, and arrange a pretend login web page to warn and deter the service’s customers.

Legislation enforcement additionally seized the service’s database, acquiring e mail addresses and different knowledge that linked using AVCheck to recognized ransomware teams.

The seizure was carried out in coordination with Finnish and Dutch authorities, as a part of Operation Endgame, which lately focused the DanaBot botnet and the Lumma Stealer data stealer.

Legislation enforcement businesses in Denmark, Finland, France, Germany, the Netherlands, and the US participated within the operation, with assist from authorities in Portugal and Ukraine.

“By leveraging counter antivirus companies, malicious actors refine their weapons towards the world’s hardest safety methods to raised slip previous firewalls, evade forensic evaluation, and wreak havoc throughout victims’ methods,” FBI Particular Agent Douglas Williams mentioned.Commercial. Scroll to proceed studying.

Associated: Russian Qakbot Gang Chief Indicted in US

Associated: Europol Targets Prospects of Smokeloader Pay-Per-Set up Botnet

Associated: Bumblebee Malware Loader Resurfaces Following Legislation Enforcement Takedown

Associated: Ukrainian Sentenced to Jail in US for Position in Zeus, IcedID Malware Operations

Security Week News Tags:Antivirus, AVCheck, Counter, Enforcement, Law, Service, Shut

Post navigation

Previous Post: US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles
Next Post: Denodo Scheduler Vulnerability Let Attackers Execute Remote Code

Related Posts

Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
Grok-4 Falls to a Jailbreak Two days After Its Release Security Week News
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Security Week News
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit Security Week News
Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies Security Week News
CISA Releases Guidance on SIEM and SOAR Implementation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025
  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News