
International cybercrime malware service targeting thousands of unsuspecting consumers dismantled
Remote Access Trojan malware allowed cybercriminals to connect to victims’ computers to steal data and engage in other malicious activities
Published on: 12 Feb 2024
An international operation has resulted in the seizure of several internet domains that were used to sell malware used by cybercriminals. The malware was used to secretly access and connect to victims’ computers for malicious purposes. The operation was led by the FBI and supported by Europol and the Joint Cybercrime Action Taskforce (J-CAT).
On 7 February, two suspects were arrested in Malta and Nigeria in the framework of the operation. The suspects are accused of selling the malware and supporting cybercriminals who used the malware for malicious purposes.
Europol provided analytical support to the investigation which led to the operation involving Australia, Canada, Croatia, Finland, Germany, Malta, the Netherlands, Nigeria, Romania and the United States. These countries provided valuable assistance securing the servers hosting the Warzone RAT infrastructure.
The Warzone RAT malware, a sophisticated Remote Access Trojan (RAT), was on sale via internet domains. The RAT malware enabled cybercriminals to browse victims’ file systems, take screenshots, record keystrokes, steal victims’ usernames and passwords, and watch victims through their web cameras, all without the victims’ knowledge or permission.
Avoid RAT-ingThe public and businesses can follow simple steps to help protect themselves from malware:
- Update your software, including anti-virus software;
- Install a good firewall;
- Don’t open suspicious email attachments or URLs – even if they come from people on your contact list;
- Create strong passwords.
For more advice on how to protect yourself against Remote Access Trojans, check:
https://www.europol.europa.eu/
Discover more from #News247WorldPress
Subscribe to get the latest posts sent to your email.

