En ukrainsk 🇺🇦 mand, der udviklede og administrerede #IcedID #malware -bot-nettet, forfalskede sin egen død i et forsøg på at undslippe FBI og fængselsstraf i 🇺🇸 .

.. unavngivne mistænkte bestak ukrainske politi-betjente til at forfalske dokumenter og udstede en dødsattest i hans navn

..i april 2024, 1 måned før Europol og FBI beslaglagde IcedID-serverne, hvilket tyder på, at der var en lækage i efterforskningen
https://reyestr.court.gov.ua/Review/133125529 (🇺🇦 )

Єдиний державний реєстр судових рішень

📢 ‘Tank’ (Vyacheslav Penchukov) brise le silence: de Zeus au ransomware et à Evil Corp
📝 Source: BBC (BBC World Service).
📖 cyberveille : https://cyberveille.ch/posts/2025-11-15-tank-vyacheslav-penchukov-brise-le-silence-de-zeus-au-ransomware-et-a-evil-corp/
🌐 source : https://www.bbc.com/news/articles/cm2w0pvg4wko
#Evil_Corp #IcedID #Cyberveille
‘Tank’ (Vyacheslav Penchukov) brise le silence: de Zeus au ransomware et à Evil Corp

Source: BBC (BBC World Service). Dans une interview exclusive en prison menée par Joe Tidy 🎙️, Vyacheslav “Tank” Penchukov, ex-membre clé de la cyber-escène, raconte son parcours de la bande Jabber Zeus à IcedID et à l’écosystème du ransomware, livrant des détails sur les gangs, leurs méthodes et des acteurs encore en cavale, dont l’énigmatique tête présumée d’Evil Corp. Dans les années 2000, Penchukov dirige la redoutée équipe Jabber Zeus, combinant le malware bancaire Zeus et la messagerie Jabber pour voler directement sur les comptes de PME, collectivités et associations. Au Royaume-Uni, plus de 600 victimes perdent plus de £4M en trois mois. Identifié après l’interception de chats, il échappe à l’opération Trident Breach de l’FBI en Ukraine, avant de tenter une reconversion (commerce de charbon) puis de replonger, évoquant pressions financières et contexte politique (Crimée).

CyberVeille

Debellate dall'Europol tutte le botnet ramsonware. Operation Endgame, la più grande operazione della storia contro le botnet. Operazione Endgame è un'operazione internazionale delle forze dell'ordine che mira a combattere le botnet e i loro utilizzatori.
Tra il 27 e il 29 maggio 2024 è stata messa in atto un'operazione internazionale di contrasto al crimine...

#botnet #Bumblebee #Europol #hackers #IcedID #OperationEndgame #Pikabot #Ransomware #SmokeLoader #SystemBC

https://scienzamagia.eu/misteri-ufo/debellate-dalleuropol-tutte-le-botnet-ramsonware/

Debellate dall'Europol tutte le botnet ramsonware

Operation Endgame, la più grande operazione della storia contro le botnet. Operazione Endgame è un'operazione internazionale delle forze dell'ordine che mir

#ユーロポール#IcedID#TrickBot 、その他のマルウェアに関連した100台以上のサーバーを #シャットダウン 」: The Hacker News

「ユーロポールは木曜日、 #Operation #Endgame というコード名で行われる法執行機関の連携活動の一環として、IcedID、 #SystemB C、 #PikaBo t、 #SmokeLoader#Bumblebee 、TrickBotなどのいくつかのマルウェアローダー操作に関連するインフラストラクチャを停止したと発表した 。
この措置は5月27日から5月29日までの間に行われ、 #アルメニア#オランダ#ポルトガル の16か所にわたる捜索の結果、世界中で100台以上のサーバーが解体され、アルメニアで1人、ウクライナで3人の計4人が #逮捕 された。 、そして #ウクライナ 。 」

戦禍のウクライナでも、ややこしいことをしている奴がいる。

https://thehackernews.com/2024/05/europol-dismantles-100-servers-linked.html

#prattohome #TheHackerNews

Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware

Europol takes down major malware loader operations in Operation Endgame. Over 100 servers dismantled and four arrests made.

The Hacker News

Today we celebrate a major cybersecurity victory. 👏 Operation Endgame, a global law enforcement effort supported by insights from experts at Proofpoint and other industry vendors, resulted in:

• The disruption of major botnets
• Four arrests
• Over 100 servers taken down across 10 countries
• Over 2,000 domains brought under the control of law enforcement
• Illegal assets frozen

Proofpoint’s mission is to provide the best human-centric protection for our customers against advanced threats. Whenever possible and appropriate to do so, Proofpoint uses its team’s knowledge and skills to help protect a wider audience against widespread malware threats.

For #OperationEndgame, Proofpoint threat researchers lent their expertise in reverse engineering malware, botnet infrastructure, and identifying patterns in how the threat actors set up their servers to help authorities understand the malware and safely remediate the bot clients.

Proofpoint’s unmatched threat telemetry and researcher knowledge played a crucial role in the operation, providing key insights in identifying the new botnets that are most likely to grow and become the dominant threats affecting the most number of people around the world.

More information on the takedown and Proofpoint’s involvement can be found in our blog: https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown.

#IcedID #SystemBC #Pikabot #SmokeLoader #Bumblebee #Trickbot #Europol

Operation Endgame - Global Law Enforcement Malware Takedown | Proofpoint US

Operation Endgame was a widespread effort to disrupt malware and botnet operations. Learn how global law enforcement collaborated with Proofpoint to succeed.

Proofpoint
‘Operation Endgame’ Hits Malware Delivery Platforms – Krebs on Security

‘Operation Endgame’ Hits Malware Delivery Platforms - Law enforcement agencies in the United States and Europe today announced Operation... https://krebsonsecurity.com/2024/05/operation-endgame-hits-malware-delivery-platforms/ #neer-do-wellnews #operationendgame #thecomingstorm #mattburgess #smokeloader #ransomware #trickbot #europol #lockbit #icedid #911s5
‘Operation Endgame’ Hits Malware Delivery Platforms – Krebs on Security

Largest ever operation against botnets hits dropper malware ecosystem | Europol

OP Endgame

Europol

We are proud to announce that Sekoia #TDR team contributed to the joint international law enforcement operation #OperationEndgame, targeting the notorious botnets #IcedID, #Smokeloader, #SystemBC and #Pikabot

https://operation-endgame.com/

Operation Endgame

Operation endgame