Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Counter Antivirus Service AVCheck Shut Down by Law Enforcement

Counter Antivirus Service AVCheck Shut Down by Law Enforcement

Posted on June 2, 2025June 2, 2025 By CWS

Dutch authorities introduced the takedown of AVCheck, one of many largest counter antivirus (CAV) companies utilized by cybercriminals worldwide.

CAV companies corresponding to AVCheck play an vital function within the malware deployment course of, as they permit cybercriminals to check if their malware is detected by antivirus merchandise and scanners, earlier than utilizing it in real-world assaults.

Malware that may evade detection can then be deployed with out being seen to steal data, acquire and preserve entry to compromised methods, and encrypt knowledge or lock down total enterprise networks.

Cybercriminals usually use CAV companies together with crypting companies, which are supposed to make the malware tougher to detect.

AVCheck was taken down on Might 27, when authorities seized 4 domains and their related server, and arrange a pretend login web page to warn and deter the service’s customers.

Legislation enforcement additionally seized the service’s database, acquiring e mail addresses and different knowledge that linked using AVCheck to recognized ransomware teams.

The seizure was carried out in coordination with Finnish and Dutch authorities, as a part of Operation Endgame, which lately focused the DanaBot botnet and the Lumma Stealer data stealer.

Legislation enforcement businesses in Denmark, Finland, France, Germany, the Netherlands, and the US participated within the operation, with assist from authorities in Portugal and Ukraine.

“By leveraging counter antivirus companies, malicious actors refine their weapons towards the world’s hardest safety methods to raised slip previous firewalls, evade forensic evaluation, and wreak havoc throughout victims’ methods,” FBI Particular Agent Douglas Williams mentioned.Commercial. Scroll to proceed studying.

Associated: Russian Qakbot Gang Chief Indicted in US

Associated: Europol Targets Prospects of Smokeloader Pay-Per-Set up Botnet

Associated: Bumblebee Malware Loader Resurfaces Following Legislation Enforcement Takedown

Associated: Ukrainian Sentenced to Jail in US for Position in Zeus, IcedID Malware Operations

Security Week News Tags:Antivirus, AVCheck, Counter, Enforcement, Law, Service, Shut

Post navigation

Previous Post: US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles
Next Post: Denodo Scheduler Vulnerability Let Attackers Execute Remote Code

Related Posts

React2Shell Attacks Linked to North Korean Hackers React2Shell Attacks Linked to North Korean Hackers Security Week News
Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities Security Week News
Cellcom Service Disruption Caused by Cyberattack Cellcom Service Disruption Caused by Cyberattack Security Week News
European Airport Disruptions Caused by Ransomware Attack European Airport Disruptions Caused by Ransomware Attack Security Week News
Adidas Data Breach Linked to Third-Party Vendor Adidas Data Breach Linked to Third-Party Vendor Security Week News
Critical SolarWinds Vulnerability Under Active Exploitation Critical SolarWinds Vulnerability Under Active Exploitation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News