Wednesday, April 23, 2025
HomeCyber Security NewsSmokeloader Malware Operators Busted, Servers Seized by Authorities

Smokeloader Malware Operators Busted, Servers Seized by Authorities

Published on

SIEM as a Service

Follow Us on Google News

In a major victory against cybercrime, law enforcement agencies across North America and Europe have dismantled the infrastructure behind the Smokeloader malware, a notorious pay-per-install (PPI) botnet service.

This decisive action, a continuation of the groundbreaking Operation Endgame from May 2024, marks yet another blow to the global malware ecosystem.

The Smokeloader botnet, operated by an individual known as “Superstar,” served as a platform for cybercriminals, offering access to compromised machines for malicious purposes.

- Advertisement - Google News

Customers of the botnet deployed a range of harmful payloads, including ransomware, keyloggers, cryptominers, and more.

Europal’s Investigations revealed that these customers exploited Smokeloader for personal profit and illicit activities, believing the pseudonymity of the dark web shielded their identities.

A Coordinated Crackdown

Following months of investigation, law enforcement agencies executed a series of coordinated actions aimed at Smokeloader’s operators and users.

Authorities conducted arrests, house searches, and issued warrants across multiple countries, leveraging intelligence gained during Operation Endgame.

A critical breakthrough came from a database seized last year, which contained the identities of Smokeloader’s customers.

This operation differs from the earlier takedown by targeting the demand side of the malware-as-a-service chain.

While high-level actors were the focus of Operation Endgame, this follow-up seeks to prosecute individuals directly responsible for leveraging criminal services for their own gain.

Some suspects, unaware they were still under surveillance, cooperated with investigators, providing access to digital evidence stored on their devices.

Unmasking Smokeloader’s Ecosystem

According to Europol and the Joint Cybercrime Action Taskforce (J-CAT), some users of Smokeloader went a step further, reselling access to the botnet at inflated prices.

These findings have deepened the investigation as authorities continue linking usernames and online activity to real-world identities.

To assist the ongoing operation, authorities have launched a dedicated website, operation-endgame.com.

This platform provides updates on new actions and invites individuals with information to come forward confidentially.

Suspects involved in the operation who remain at large are being warned that their participation will not go unnoticed.

International Collaboration

The success of this operation relies heavily on global collaboration. Participating agencies include Canada’s Royal Canadian Mounted Police (RCMP), the FBI, Europol, the Netherlands Police, Germany’s Federal Criminal Police Office (BKA), and others.

Together, they’ve facilitated information sharing, forensics, and operational coordination through regular meetings and sprints organized by Europol in The Hague.

This latest development underscores the relentless pursuit of justice in the cybercrime world. Authorities have demonstrated that even those operating in the shadows will be held accountable.

Operation Endgame is far from concluded, and its ripple effects will continue to reshape the cybercrime landscape for the foreseeable future.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls

Zyxel, a leading provider of secure networking solutions, has released critical security patches to...

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been...

CISA Issues Five ICS Advisories Highlighting Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released five urgent advisories on...

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls

Zyxel, a leading provider of secure networking solutions, has released critical security patches to...

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been...

CISA Issues Five ICS Advisories Highlighting Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released five urgent advisories on...