Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

Posted on May 31, 2025May 31, 2025 By CWS

Might 31, 2025Ravie LakshmananMalware / Cyber Crime
A multinational legislation enforcement operation has resulted within the takedown of a web-based cybercrime syndicate that provided providers to risk actors to make sure that their malicious software program stayed undetected from safety software program.
To that impact, the U.S. Division of Justice (DoJ) stated it seized 4 domains and their related server facilitated the crypting service on Might 27, 2025, in partnership with Dutch and Finnish authorities. These embody AvCheck[.]web, Cryptor[.]biz, and Crypt[.]guru, all of which now show a seizure discover.
Different international locations that participated within the effort embody France, Germany, Denmark, Portugal, and Ukraine.
“Crypting is the method of utilizing software program to make malware tough for antivirus applications to detect,” the DoJ stated. “The seized domains provided providers to cybercriminals, together with counter-antivirus (CAV) instruments. When used collectively, CAV and crypting providers enable criminals to obfuscate malware, making it undetectable and enabling unauthorized entry to laptop techniques.”

The DoJ stated authorities made undercover purchases to investigate the providers and confirmed that they have been getting used for cybercrime. In a coordinated announcement, Dutch officers characterised AvCheck as one of many largest CAV providers utilized by dangerous actors world wide.
Based on snapshots captured by the Web Archive, AvCheck[.]web billed itself as a “high-speed antivirus scantime checker,” providing the power for registered customers to scan their recordsdata towards 26 antivirus engines, in addition to domains and IP addresses with 22 antivirus engines and blocklists.
The area seizures have been carried out as a part of Operation Endgame, an ongoing international effort launched in 2024 to dismantle cybercrime. It marks the fourth main motion in latest weeks after the disruption of Lumma Stealer, DanaBot, and tons of of domains and servers utilized by varied malware households to ship ransomware.

“Cybercriminals do not simply create malware; they good it for optimum destruction,” stated FBI Houston Particular Agent in Cost Douglas Williams. “By leveraging counter-antivirus providers, malicious actors refine their weapons towards the world’s hardest safety techniques to higher slip previous firewalls, evade forensic evaluation, and wreak havoc throughout victims’ techniques.”
The event comes as eSentire detailed PureCrypter, a malware-as-a-service (MaaS) answer that is getting used to distribute info stealers like Lumma and Rhadamanthys utilizing the ClickFix preliminary entry vector.
Marketed on Hackforums[.]web by a risk actor named PureCoder for $159 for 3 months, $399 for one 12 months, or $799 for lifetime entry, the crypter is distributed utilizing an automatic Telegram channel, @ThePureBot, which additionally serves as a market for different choices, together with PureRAT and PureLogs.
Like different purveyors of such instruments, PureCoder requires customers to acknowledge a Phrases of Service (ToS) settlement that claims the software program is supposed just for instructional functions and that any violations would end in quick revocation of their entry and serial key.

The malware additionally incorporates the power to patch the NtManageHotPatch API in reminiscence on Home windows machines working 24H2 or newer to re-enable course of hollowing-based code injection. The findings display how risk actors shortly adapt and devise methods to defeat new safety mechanisms.
“The malware employs a number of evasion methods together with AMSI bypass, DLL unhooking, anti-VM detection, anti-debugging measures, and not too long ago added capabilities to bypass Home windows 11 24H2 safety features by NtManageHotPatch API patching,” the Canadian cybersecurity firm stated.
“The builders use misleading advertising ways by selling ‘Totally UnDetected’ (FUD) standing based mostly on AvCheck[.]web outcomes, whereas VirusTotal exhibits detection by a number of AV/EDR options, revealing important discrepancies in detection charges.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Crypting, Cybercrime, DoJ, Domains, Global, Operation, Seizes, Services, Supporting, U.S

Post navigation

Previous Post: Threat Actors Leverage Google Apps Script To Host Phishing Websites
Next Post: New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Related Posts

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization The Hacker News
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations The Hacker News
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents The Hacker News
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials The Hacker News
Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News