Skip to content

Global enforcement actions targeting predominantly Russian cybercriminal groups

Co-ordinated Global Action Targeting Mainly Russian Cyber Threat Actors

Wire Link for Data Transmission
Wire Link for Data Transmission

International cyber attacks against predominantly Russian criminal groups ceased - Global enforcement actions targeting predominantly Russian cybercriminal groups

Global Takedown of Alleged Russian Cybercriminals

Law enforcement agencies from various nations, including Germany, the United States, and others, have carried out a joint operation, seizing control over roughly 300 servers worldwide, with around 50 servers situated in Germany, and neutralizing around 650 internet domains. This move significantly weakened the operational base of the suspected cybercriminals. In addition, authorities seized cryptocurrency worth approximately €3.5 million at the time.

The operation forms part of "Operation Endgame," initiated by Germany in 2022. President of the Federal Criminal Police Office (BKA), Holger Münch, stated, "Our strategies are effective - even in the seemingly anonymous darknet." These actions are significant contributions to enhancing global cybersecurity.

In Germany, ongoing investigations suggest organized extortion and membership in a foreign criminal organization. Authorities issued international arrest warrants for 20 suspects, the majority of whom are Russian, in connection with these allegations.

The BKA, the General Prosecutor's Office Frankfurt, and other authorities in Germany, the Netherlands, Denmark, the United Kingdom, Canada, the USA, France, and other nations participated in the operation.

The operation targeted predominantly Russian cybercriminals, accused of operating malware like Qakbot and Trickbot. These malware strains are used for numerous cybercrimes, including data theft and ransomware attacks. While not all details of the 20 suspects have been disclosed, some notable individuals named in related investigations include Rustam Rafailevich Gallyamov, Aleksandr Stepanov (AKA JimmBee), and Artem Aleksandrovich Kalinkin (AKA Onix), all involved in Qakbot and Danabot malware operations. The operation entailed the seizure of servers and domains, significantly impacting the cybercriminals' infrastructure. For instance, in Germany alone, 50 servers were deactivated, and 650 domains were taken out of the hands of the cybercriminals.

This joint operation demonstrates international cooperation in combating cybercrime. Arrest warrants were issued for suspects principally residing in Russia. For a comprehensive understanding, more specific details would require further release from the involved authorities.

  1. The massive joint operation against Russian cybercriminals, involving EC countries like Germany and the United States, focuses on enhancing employment policies in the cybersecurity sector by dismantling malware such as Qakbot and Trickbot, which are frequently used for data theft and ransomware attacks.
  2. With increasing general-news reports about crime-and-justice related to cybersecurity, technology plays a crucial role in these investigations, as law enforcement agencies rely on technology to trace and neutralize cybercriminals, ultimately leading to the improvement of employment policy issues in the field of cybercrime investigation.

Read also:

    Latest