Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Interpol Targets Infostealers: 20,000 IPs Taken Down, 32 Arrested, 216,000 Victims Notified

Posted on June 12, 2025June 12, 2025 By CWS

Interpol introduced on Wednesday that it not too long ago focused infostealer malware in an operation that spanned a number of months and concerned regulation enforcement businesses in additional than two dozen international locations.

As a part of Operation Safe, which ran between January and April, Interpol, its regulation enforcement companions, and cybersecurity corporations Kaspersky, Group-IB and Pattern Micro focused infostealer campaigns originating in Asia.

The operation concerned the takedown of 20,000 IP addresses and domains, and the seizure of 41 servers and greater than 100 Gb of knowledge.

Authorities arrested 32 suspects, together with 18 in Vietnam and 14 in Sri Lanka and Nauru. The chief of a Vietnamese group was discovered to own over $11,000 in money, SIM playing cards, and enterprise registration paperwork, suggesting involvement in a scheme to promote company accounts.

In Hong Kong, police recognized 117 command and management (C&C) servers hosted throughout almost 90 ISPs. 

Authorities notified greater than 216,000 victims and urged them to take motion to mitigate the impression of infostealer malware infections.

Infostealers allow cybercriminals to steal priceless information from compromised methods, together with credentials, fee card information, and cryptocurrency wallets.

Kaspersky revealed that the operation focused almost 70 infostealer variants. Group-IB targeted on malware households similar to Lumma, Risepro, and META Stealer.Commercial. Scroll to proceed studying.

Pattern Micro’s investigation targeted on malware similar to Vidar, Lumma Stealer, and Rhadamanthys, which the corporate described as “a number of the most distinguished infostealer households detected on this operation”. 

The information comes simply weeks after Microsoft and international regulation enforcement introduced the disruption of the Lumma Stealer operation. 

Associated: Microsoft Says One Million Gadgets Impacted by Infostealer Marketing campaign

Associated: Infostealer Infections Result in Telefonica Ticketing System Breach

Associated: Counter Antivirus Service AVCheck Shut Down by Legislation Enforcement

Security Week News Tags:Arrested, Infostealers, INTERPOL, IPs, Notified, Targets, Victims

Post navigation

Previous Post: ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
Next Post: Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Related Posts

Samsung Announces Security Improvements for Galaxy Smartphones Security Week News
ChatGPT’s Calendar Integration Can Be Exploited to Steal Emails Security Week News
ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities Security Week News
US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack Security Week News
Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People Security Week News
New Exploit Poses Threat to SAP NetWeaver Instances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
  • Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding
  • Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys
  • Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing
  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News