{
	"id": "fc2b57b7-2659-4e5e-801d-b3b9e4d56686",
	"created_at": "2026-04-06T00:19:04.275451Z",
	"updated_at": "2026-04-10T13:11:29.360567Z",
	"deleted_at": null,
	"sha1_hash": "36c474b9aa5cbc35348b40e940f5cfa677ec72e1",
	"title": "International cybercrime malware service targeting thousands of unsuspecting consumers dismantled",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1180240,
	"plain_text": "International cybercrime malware service targeting thousands of\r\nunsuspecting consumers dismantled\r\nBy Europol\r\nPublished: 2024-02-12 · Archived: 2026-04-05 19:40:00 UTC\r\nAn international operation has resulted in the seizure of several internet domains that were used by cybercriminals\r\nto sell malware. Through use of this malware, cybercriminals could secretly access and connect to victims’\r\ncomputers for malicious purposes. The operation was led by the FBI and supported by Europol and the Joint\r\nCybercrime Action Taskforce (J-CAT). \r\nOn 7 February, two suspects were arrested in Malta and Nigeria in the framework of the operation. The suspects\r\nare accused of selling the malware and supporting cybercriminals who used the malware for malicious purposes. \r\nEuropol provided analytical support to the investigation which led to the operation involving Australia, Canada,\r\nCroatia, Finland, Germany, Malta, the Netherlands, Nigeria, Romania and the United States. These countries\r\nprovided valuable assistance securing the servers hosting the Warzone RAT infrastructure. \r\nThe Warzone RAT malware, a sophisticated Remote Access Trojan (RAT), was on sale via internet domains. The\r\nRAT malware enabled cybercriminals to browse victims’ file systems, take screenshots, record keystrokes, steal\r\nvictims’ usernames and passwords, and watch victims through their web cameras, all without the victims’\r\nknowledge or permission.\r\nAvoid RAT-ing\r\nThe public and businesses can follow simple steps to help protect themselves from malware:\r\nhttps://www.europol.europa.eu/media-press/newsroom/news/international-cybercrime-malware-service-targeting-thousands-of-unsuspecting-consumers-dismantled\r\nPage 1 of 2\n\nUpdate your software, including anti-virus software;\r\nInstall a good firewall;\r\nDon’t open suspicious email attachments or URLs – even if they come from people on your contact list;\r\nCreate strong passwords.\r\nFind out how to protect yourself against Remote Access Trojans.\r\nSource: https://www.europol.europa.eu/media-press/newsroom/news/international-cybercrime-malware-service-targeting-thousands-of-unsusp\r\necting-consumers-dismantled\r\nhttps://www.europol.europa.eu/media-press/newsroom/news/international-cybercrime-malware-service-targeting-thousands-of-unsuspecting-consumers-dismantled\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.europol.europa.eu/media-press/newsroom/news/international-cybercrime-malware-service-targeting-thousands-of-unsuspecting-consumers-dismantled"
	],
	"report_names": [
		"international-cybercrime-malware-service-targeting-thousands-of-unsuspecting-consumers-dismantled"
	],
	"threat_actors": [],
	"ts_created_at": 1775434744,
	"ts_updated_at": 1775826689,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/36c474b9aa5cbc35348b40e940f5cfa677ec72e1.pdf",
		"text": "https://archive.orkl.eu/36c474b9aa5cbc35348b40e940f5cfa677ec72e1.txt",
		"img": "https://archive.orkl.eu/36c474b9aa5cbc35348b40e940f5cfa677ec72e1.jpg"
	}
}