- Europol monitors the final operation of last year’s operation last year
- Made multiple arrests and home searches
- Some suspects cooperated, but this could be just the beginning
In a monitoring of its operation operation of the operation of the Botnet operation of May 2024, Europol, he said he made multiple arrests.
The European Law of Application of the Law, together with several national partners, had closed some of the greatest malware, including ICEDID, Systembc, Pikabot, Smokeloader and Bumblebee. The operation covered numerous countries and multiple continents.
Now, in a press release published on the Europol website, it was said that the operation continued, but this time against SmoKeloader customers.
New actions
SmoKeloader is a payment charger per installation, in which cybercriminals pay to use the service (which has already infected numerous devices) and eliminate their own malware. Europol said that criminals used SmoKeloader for Keylogging, access to webcam, ransomware implementation, cryptomination and more.
“The police tracked customers when they were registered in a database seized during the end of the game,” said Europol, saying that these people now faced “house searches, arrest orders or ‘blows and talks.”
He did not discuss the number of people involved, but said that “several suspects” cooperated with the authorities by facilitating the examination of their digital devices. Several other suspects admitted having relieved Smokeloader’s services in a marking.
As in the Endgame Operation, multiple agencies for the application of the law were involved in the follow -up, including the FBI, the Secret Service, the DOD, DCIS, the Royal Canadian police mounted police (RCMP), the Czeca Police, the Danish Police, the French National Police, the Federal Criminal Police of Germany, the Police of the Attorney General of the National Police of the National Office of the National Office of the National Office.
The agency also said that the operation has not yet concluded and that the “new actions” will soon be announced on the Operation-endgame.com website.
“Any person with information is invited to contact the authorities through this website,” he said. “In addition, the suspects involved in these and other botnets, which have not yet been arrested, will be directly responsible for their actions.”