Police Shut Down A Criminal Malware Operation

European and US law enforcement  have taken down AVCheck, a major cyber crime system used by hackers to test if security tools could detect their malware in a a combined operation. The police also collected of information about the cyber criminals themselves. 

According to the Netherlands police’s report, they exploited the mistakes of the criminal website’s admins. The criminals were using malware to access computer systems, collect sensitive data, and digitally lock entire organisations out of their own systems. 

‘Taking AVCheck offline is an important step in the fight against organised cyber crime, because it disrupts the activities of cyber criminals in the earliest stages and prevents victims.’  Matthijs Jaspers, Team Lead of the Dutch Police High Tech Crime Team commented.

Furthermore, the investigation has yielded key evidence on the administrators and users of AVCheck and its related services Cryptor.biz and Crypt.guru. The data about cyber criminals includes usernames, email addresses, payment information, and other key evidence.

The related services, Cryptor.biz and Crypt.guru, have also been taken offline by the international law enforcement operation led by the Netherlands police and supported by the US and Finnish authorities. The US authorities seized four domains and a server linked to cyber crime services.

ABCHeck was one of the largest so-called Counter Antivirus (CAV) or crypting services, and it allowed malware developers to scrutinize their code against various antivirus solutions. The takedown will make it harder for cyber crooks to carry out malware attacks.

CAV services like AVCheck are essential for cybercriminals to bypass security systems and infect victims undetected, making them key components in malware deployment.

As part of broader efforts, the Dutch police launched a fake AVCheck login page to confront and deter users. The AVCheck service was widely used by suspects involved in Operation Endgame, a recent Europol operation to dismantle malware distribution services.

Police officers made undercover purchases from the crime websites and analysed them to confirm they were designed for cybercrime, according to the court documents. 

The officers also reviewed linked email addresses and other data connecting the services to known ransomware groups that have targeted victims in the US and EU.

Politie   |   Europol   |   Cybernews   |     US Dept of Justice  |   Infosecurity Magazine   |   CT Insight

Image @Politie

You Might Also Read: 

Lockbit Ransomware Group Hacked:


If you like this website and use the comprehensive 7,000+ service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Three Million Records Exposed In Passion.io Data Breach

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cloud53

Cloud53

Clolud53 is a Manchester based Managed Cyber Security & Cloud company providing solutions focused around you.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.

Sesame Technologies

Sesame Technologies

Sesame Technologies provides advanced cybersecurity services to protect businesses from digital threats.