International cybercrime malware service targeting thousands of unsuspecting consumers dismantled

Remote Access Trojan malware allowed cybercriminals to connect to victims’ computers to steal data and engage in other malicious activities



On 7 February, two suspects were arrested in Malta and Nigeria in the framework of the operation. The suspects are accused of selling the malware and supporting cybercriminals who used the malware for malicious purposes. 
Europol provided analytical support to the investigation which led to the operation involving Australia, Canada, Croatia, Finland, Germany, Malta, the Netherlands, Nigeria, Romania and the United States. These countries provided valuable assistance securing the servers hosting the Warzone RAT infrastructure. 

The Warzone RAT malware, a sophisticated Remote Access Trojan (RAT), was on sale via internet domains. The RAT malware enabled cybercriminals to browse victims’ file systems, take screenshots, record keystrokes, steal victims’ usernames and passwords, and watch victims through their web cameras, all without the victims’ knowledge or permission.

Avoid RAT-ing

The public and businesses can follow simple steps to help protect themselves from malware:

  • Update your software, including anti-virus software;
  • Install a good firewall;
  • Don’t open suspicious email attachments or URLs – even if they come from people on your contact list;
  • Create strong passwords.

Find out how to protect yourself against Remote Access Trojans.


Commenti