Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds actively exploited ConnectWise and Windows flaws to KEV

Advances in integrated energy systems: Inside the ELEXIA project

Insights from the latest ESOTC report

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.
Identity

Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

By June 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 11, 2025Ravi LakshmananCybercrime/Malware

Wednesday Interpol announced the dismantling of over 20,000 malicious IP addresses or domains linked to 69 information-stolen malware variants.

Joint Action, Codename Operation Secure took place between January and April 2025, and involved law enforcement agencies in 26 countries, identifying servers, mapping physical networks, and performing targeted takedowns.

“These coordinated efforts resulted in a takedown of 79% of the suspicious IP addresses identified,” Interpol said in a statement. “Participation countries have reported the seizure of 41 servers and 100 GB of data and the arrest of 32 suspects related to illegal cyber activity.”

Cybersecurity

Vietnamese authorities arrested 18 suspects, confiscating confiscated devices, SIM cards, business registration documents and money worth $11,500. Further attacks on the house have arrested 12 more people in Sri Lanka and two individuals in Nauru.

Hong Kong police per Interpol have identified 117 command and control servers hosted by 89 internet service providers. These servers are designed to serve as hubs for launching and managing malicious campaigns such as phishing, online scams, and social media scams.

Countries involved in safe operations include Brunei, Cambodia, Fiji, Hong Kong (China), India, Indonesia, Indonesia, Japan, Kazakhstan, Kilibati, Laos, Macau (China), Malaysia, Maldives, Nauru, Nepal, Papua New Guinea, Philippines, Samo, Singapore, Sormon Island, Samo, Samoa, Samoa, Tonga, Vanuatu, and Vietnam.

The development comes just weeks after global operations led to the seizing of 2,300 domains related to Lumma Stealer malware.

Information stealing, often sold on subscription-based Cyber ​​Crime Underground, is considered a stepping stone for threat accessers to gain unauthorized access to their target networks. These malicious programs allow you to siphon up your browser credentials, passwords, cookies, credit card details, and cryptocurrency wallet data from infected machines.

Cybersecurity

Stolen information is monetized in the form of logs on various forums, allowing other actors to carry out subsequent attacks such as ransomware, data breaches, and business email compromise (BEC).

Group IB, headquartered in Singapore, one of the private companies that Singapore has participated in the operation, said it provided mission-critical intelligence related to user accounts compromised by Stealer Malware, including Lumma, Risepro and Meta Stealer.

“The compromised qualifications and sensitive data obtained by cybercriminals through Infostealer malware often serve as an early vector for financial fraud and ransomware attacks,” said Dmitry Volkov, CEO of Group-IB.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy is DNS security the first defense against cyber attacks?
Next Article DraptInteractive Strength Inc. (NASDAQ:TRNR) enters $500 million facility, acquires an AI-focused $FET token and launches Crypto Treasury Asset Strategy

Related Posts

CISA adds actively exploited ConnectWise and Windows flaws to KEV

April 29, 2026

LiteLLM CVE-2026-42208 SQL injection can be exploited within 36 hours of publication.

April 29, 2026

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

April 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds actively exploited ConnectWise and Windows flaws to KEV

Advances in integrated energy systems: Inside the ELEXIA project

Insights from the latest ESOTC report

LiteLLM CVE-2026-42208 SQL injection can be exploited within 36 hours of publication.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.