Archive for Law Enforcement

Operation Secure disrupts global infostealer malware operations

Posted in Commentary with tags on June 11, 2025 by itnerd

An international law enforcement action codenamed “Operation Secure” targeted infostealer malware infrastructure in a massive crackdown across 26 countries, resulting in 32 arrests, data seizures, and server takedowns.

More than 20,000 malicious IP addresses or domains linked to information stealers have been taken down in an INTERPOL-coordinated operation against cybercriminal infrastructure.

During Operation Secure (January – April 2025) law enforcement agencies from 26 countries worked to locate servers, map physical networks and execute targeted takedowns.

Ahead of the operation, INTERPOL cooperated with private-sector partners Group-IB, Kaspersky and Trend Micro to produce Cyber Activity Reports, sharing critical intelligence with cyber teams across Asia. These coordinated efforts resulted in the takedown of 79 per cent of identified suspicious IP addresses.

Participating countries reported the seizure of 41 servers and over 100 GB of data, as well as the arrest of 32 suspects linked to illegal cyber activities.

Ensar Seker, CISO at SOCRadar had this comment:

“Operation Secure marks one of the most impactful international crackdowns on the infostealer ecosystem to date. What stands out is the breadth and coordination of the effort. Spanning 26 countries, seizing infrastructure, and actively notifying over 200,000 victims. This scale demonstrates a global acknowledgment that infostealers are no longer niche threats but form the backbone of modern cybercrime: from initial access brokers to identity theft, fraud, and nation-state reconnaissance.”

“These 32 arrests may seem small compared to the global volume of infections, but they’re strategically vital, targeting the operators and developers, not just low-level distributors. The seizure of 100 GB of stolen data also offers intelligence gold: victim telemetry, malware configuration, and affiliate network structures can now be analyzed to inform threat hunting and attribution efforts.”

“However, it’s important to understand that disruption is not dismantling. Just like with Lumma or RedLine, underground markets are resilient. We should expect forks, rebrands, and rebuilds. The effectiveness of Operation Secure will ultimately hinge on how well this law enforcement data is integrated into public-private threat intelligence sharing, and whether proactive takedowns continue especially in jurisdictions where cybercrime actors have historically operated with little risk.”

“For defenders, the key takeaway is clear: infostealer infections are persistent, silent, and damaging. Credential hygiene, endpoint telemetry, browser artifact scanning, and access management must be prioritized. And from a policy level, this shows the value of collaboration between cybersecurity companies, hosting providers, and global law enforcement. Something the industry must keep supporting if we want to stay ahead of evolving threats.”

Erich Kron, Security Awareness Advocate at KnowBe4 follows with this comment: 

“It’s always welcome news when countries work together to take down cybercrime infrastructure and bad actors. As this is a global problem, this sort of cooperation and coordination between law enforcement organizations and the private sector from around the world is incredibly important if we are going to protect our economies from cybercriminals.”

“The theft of and selling of information is big business for cybercriminal groups, and impacts organizations and individuals alike. From personal information of employees and others, to intellectual property with a significant cost to develop, the market for stolen information has never been greater.”

Takedowns like this one are a good thing. The real trick is ensuring that the threat actors never come back. But given how out of control things are. Any day where the good guys get a win is a good day.

The FBI And Their Friends Take Down RaidForum

Posted in Commentary with tags on April 12, 2022 by itnerd

Score one for the good guys.

CNN has reported that the FBI and international partners seized control of the popular hacking forum RaidForum. At the time of the seizure, the forum had over 500k registered members, and was known for advertising hacked American data. Law enforcement agencies in the US, UK, Sweden and elsewhere were involved in the seizure.

Chris Olson, CEO, The Media Trust had this to say:

“The seizure of RaidForum is a great example of what can happen when law enforcement agencies cooperate in the global fight against cybercrime. Unfortunately, it’s not likely to have a significant impact on cybercrime, as users of RaidForum – and any “surface web” hacking boards – are not major players, and many will simply migrate elsewhere.”

“The modern Web is effectively a borderless entity, which makes cybercrime exceedingly difficult to fight. By 2025, the yearly cost for consumers and organizations is expected to reach $10.5 trillion. In the meantime, we need to take better control of our digital borders – until we do, cyber actors will continue to target consumers through Web and mobile endpoints.”

Hopefully we see more takedowns like this. Because everytime the good guys do this, it becomes less and less comfortable for threat actors to exist.

UPDATE: I have two more comments. The first is from Peter Stelzhammer, Co-founder, AV-Comparatives:

“By shutting down this forum a great source for black hats has gone. Nevertheless, there is a massive number of other sources, so stay safe on the internet and use IT security systems and backup.”

“Investigators had been preparing the operation for a year. It was coordinated by Europol’s cybercrime specialists. So, you can see how much it was online without any consequences serving the black heads. Cybercrime is making more money than the whole drug industry nowadays.”

The second is from Artur Kane, CMO, GoodAccess:

 “While hackers’ forums’ social and educational aspects are apparent, these media play a fundamental role in the community’s operational capabilities. It is where members join forces to coordinate their activities, exchange code and tools used in attacks, share experiences about exploiting vulnerabilities, sell stolen data such as passwords, and more. Reestablishing this core exchange and collaboration platform is vital for the success of cybercriminal activities. While, at first, the former members will distribute to smaller sites, a new major successor will soon arise to take the RaidFormus place. One of the likely candidates is BreachForums.”

Hydra Darknet Market Taken Down By The Germans

Posted in Commentary with tags on April 5, 2022 by itnerd

Germany’s Federal Criminal Police Office today announced (translation here) that the world’s largest illegal dark web marketplace, Hydra Darknet Market, has been taken down. The Darknet market, which has been in operation since 2015, was a Russian-language darknet marketplace that opened as a competitor to the now-defunct Russian Anonymous Marketplace (aka RAMP). The agency attributed the shutdown to an extensive investigation operation conducted by its Central Office for Combating Cybercrime (ZIT) in partnership with US law enforcement authorities since August 2021.

Chris Olson, CEO, The Media Trust, had this to say about this takedown:

“The shutdown of Hydra is a small win for cybersecurity, but a win nonetheless. Attackers who target consumers for credit card details and other personally identifiable information (PII) can’t use it directly without risking discovery and arrest; therefore, they sell this information on darknet markets instead. Without them, the incidence of cybercrime would undoubtedly decrease.”

“Unfortunately, Hydra represents a miniscule drop in the bucket of global cybercrime, which will cost organizations (and therefore consumers) about $10.5 trillion per year by 2025. Cyber actors have perfected the pipeline from Web and mobile-based phishing attacks to darknet markets which we will not name, and new ones are opening all the time. In truth – if past precedent is anything to go by – Hydra operators will likely take their digital assets and resurface in the near future under new identities and domains.”

Any takedown of an online cybercrime marketplace is a good thing. But there needs to be much more of this to send threat actors and wannabe threat actors scared. Let’s hope that law enforcement knows that.

Should You Be Compelled To Give Up Your Smartphone Password?

Posted in Commentary with tags , on August 18, 2016 by itnerd

This is a question that Canadians will now have to wrestle with as two things have happened to bring this issue to light. First was the fact that a man who had refused to serve up his smartphone password to Canadian Border officials was fined $500 after pleading guilty this week. The second is the fact that Canadian Chiefs Of Police want the Canadian Government to give them the right to compel smartphone owners to serve up their passwords as current laws on the books don’t give them that right.

Thus this question is a top of mind one. Now on one hand, I do not want anything getting in the way of law enforcement catching the bad guys. Thus I can understand why compelling smartphone users to hand over passwords makes sense. Having said that, I also think there have to be limits on this to stop anything that could be considered unreasonable search and seizure. For example, there would have to be judicial oversight to ensure that that doesn’t happen. Plus there are those who would argue that the privacy of the individual trumps all of this.

This is a complex issue and I’d be interested to hear what your thoughts are on this. Please leave a comment below to share your thoughts on this topic.

Canadian Cops Make Largest Child Porn Bust Ever…. Involving A Data Center

Posted in Commentary with tags , on March 2, 2015 by itnerd

In my last article, I bashed Canadian law enforcement. In this one, I will praise them. The Ontario Provincial Police have announced that they have made a massive child porn bust. But, it doesn’t involve people. It involves a data center:

What we do know is that police traced users trading child sexual exploitative material online to a file sharing service, which was hosted by an Ontario company with millions of dollars in profits. Police then proceeded to seize over 1.2 petabytes of data—about 1,200 terabytes, or just under one million gigabytes. The volume of information is so expansive that in order to store and analyze the data safely and securely, police had to purchase storage hardware similar to what was used by Canadian military forces in Afghanistan. To access the files, many of which are password protected, the cops developed password-cracking software in-house that is slowly sifting through the mountain of information.

This is a very unique method at attacking this evil problem. Don’t go after the individual consumers of child porn. Go after the data and where it’s hosted instead. Get that and the consumers will dry up due to lack of supply. It’s an interesting tactic. The only question that remains is if the owners of the data center are on the hook for this. They make money off of hosting this crap. Does it not stand to reason that they are responsible for what’s there? That’s an interesting question with no clear answer. Perhaps they should care what their clients host as a bust like this would have a serious impact on their business economically at the very least. Plus the owners might get criminally charged. If they did take an interest in what’s hosted in their data center, that would be another way to get this crap off the Internet for good.

Bravo to the Ontario Provincial Police for this bust!