Operation Endgame takes down over 1K servers linked to Rhadamanthys, VenomRAT, and Elysium malware

In the latest phase of Operation Endgame, Europol and law enforcement agencies from 11 countries have dismantled a vast cybercrime infrastructure responsible for spreading some of the world’s most notorious malware, including the Rhadamanthys info-stealer, the VenomRAT remote access trojan, and the Elysium botnet.

The coordinated international action resulted in one arrest in Greece, where the main suspect behind VenomRAT was taken into custody on 3 November 2025. Authorities also conducted 11 searches across Europe (one in Germany, one in Greece, and nine in the Netherlands) leading to the disruption or takedown of over 1,025 servers and the seizure of 20 domains worldwide.

The dismantled infrastructure had infected hundreds of thousands of computers globally, stealing millions of credentials from unsuspecting victims. Investigators revealed that the main suspect linked to the Rhadamanthys operation had access to more than 100,000 cryptocurrency wallets, potentially worth millions of euros.

Rhadamanthys, sold under a malware-as-a-service (MaaS) model, is designed to steal login data, authentication cookies, and sensitive information from web browsers and applications. It has been distributed through deceptive online campaigns, including fake software cracks, YouTube videos, and malicious advertisements.

Operation Endgame, one of Europe’s largest coordinated cybercrime crackdowns, has previously taken down infrastructure associated with SmokeLoader, DanaBot, IcedID, Pikabot, Trickbot, and Bumblebee.


Back to the list

Latest Posts

Cyber Security Week in Review: December 5, 2025

In brief: Critical React2Shell exploited by Chinese hackers, Microsoft silently patches Windows LNK flaw, and more.
5 December 2025

Star Blizzard’s new spear-phishing wave targeting Western NGOs supporting Ukraine

The latest activity targeted at least two organizations, including Reporters Without Borders (RSF).
4 December 2025

Iran-linked hackers target Israeli, Egyptian critical infrastructure in stealthy phishing campaign

The campaign relied on spearphishing emails that delivered PDFs containing links to malicious installers hosted on free file-sharing services.
3 December 2025