Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » US DOJ captures 4 domains that support criminal work on cybercrime in global work
Global Security

US DOJ captures 4 domains that support criminal work on cybercrime in global work

AdminBy AdminMay 31, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 31, 2025Red LakshmananMalicious software / cybercrime

The multinational law enforcement operation led to the removal of the cybercrimination Internet, which offered the threatening subjects to ensure that their malicious software went unnoticed from security software.

For this purpose, the US Department of Justice (DOJ) stated that four domains were confiscated, and the related server facilitated the Cross service on May 27, 2025 in partnership with the Dutch and Finnish authorities. These include Avcheck (.) Net, Cryptor (.) Biz and Crypt (.) Guru, all of them now reflect the notification of the attack.

Other countries involved in efforts are France, Germany, Denmark, Portugal and Ukraine.

“Currying is a process of using software to get malware to detect antivirus programs,” Doj – Note. “User domains have offered the services of cybercriminals, including antivirus tools (CAV). When used together, CAV and crying allows criminals to burden malicious software, making it uncertain and provides unauthorized access to computer systems.”

Cybersecurity

DOJ said the authorities have made purchases for the analysis of services and confirmed that they were used for cybercrime. In the coordinated message Dutch officials characterized Avcheck as one of CAV’s largest services used by bad actors worldwide.

According to shoot Encouraged by the Internet archive, Avcheck (.) Purely exposed as a “high-speed antivirus check” by offering the possibilities of registered users to scan their files against 26 antivirus engines, as well as domains and IP addresses with 22 antivirus and blocks.

The seizures of domains were carried out as part of the ENDGAME operation, the constant global effort launched in 2024 to dismantle cybercrime. This means the fourth main action in recent weeks after breaking off Theft of a lama. Danatatoand Hundreds of domains and servers Used by different families malicious programs for shipping.

“Cybercrimations not only create malicious software; they improve it for maximum destruction,” said a special FBI agent Houston, who replies Douglas Williams. “Using countervirus services, malicious entities clarify weapons against the most difficult security systems in the world to better get past the firewalls, shy away from forensic examination and apply chaos on victim systems.”

Development happens as esentire detail PurecrypterDecision Software Service Service (MAAS) used to spread stolen information thefts such as Lumma and Rhadamanthys using Vector with initial Clickfix access.

Sold on Hackforums ( Purara and Puroga.

Like other providers of such tools, Purecoder requires users to recognize the service agreement (TOS), which claims that the software is intended only for educational purposes and that any violations will lead to immediate abolition of their access and a consistent key.

Cybersecurity

Malicious software also includes the ability to patch Ntmanagehotpatch api In memory on Windows machines, running 24h2 or more new for re -introduction, based on code -based presentation. The findings demonstrate how the threats are quickly adapted and developed ways to defeat new security mechanisms.

“In malicious programs, several evading methods are used, including AMSI, DLL, which unwind, detection of anti-VM, control measures, and recently added opportunities to bypass Windows 11 24h2 security features through Ntmanagehotpatch API Patching, Canadian Cyber ​​Safety Company” Cyber ​​Safety Company ” – Note.

“Developers use malleable marketing tactics, promoting” completely unnoticed “(FUD) status based on pure Avcheck results (.), While Virustotal shows the detection of multiple AV/EDR solutions, which reveals significant discrepancies in the detection rate.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.