Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Interpol Demonrates 20,000+ malicious IPS related to 69 malware work
Global Security

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

AdminBy AdminJune 11, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 11, 2025Red LakshmananCybercrime / malicious software

On Wednesday, Interpol announced the dismantling of more than 20,000 malicious IP addresses or domains related to 69 malware options that theft of information.

Joint action, codan is named The operation is safeoccurred from January to April 2025 and participated law enforcement agencies From 26 countries to identify servers, displaying physical networks and execution of purposeful removal.

“These coordinated efforts have led to the removal of 79 percent of the identified IP IP”, interpol – Note In a statement. “The participating countries have reported 41 servers and more than 100 GB of data, as well as the arrest of 32 suspects related to illegal cyber activity.”

Cybersecurity

Vietnam authorities arrested 18 suspects and seized devices, sim cards, documents for business registration and money worth $ 11,500. Further raids led to the arrest of 12 more people on Sri Lanka and two people in Nauru.

Police in Hong Kong, for Interpol, identified 117 servers of teams and control, located in 89 Internet service providers. These servers were designed to act as a center for launching and management by malicious companies such as phishing, internet fraud and social media scams.

Countries Involved in Operation Secure Include Brunei, Cambodia, Fiji, Hong Kong (China), India, Indonesia, Japan, Kazakhstan, Kiribati, Laos, Macau (China), Malaysia, Maldives, Nauru, Nauru, Nauru, Nauru Papua New Guinea, Philippines, Samoa, Singapore, Solomon Islands, South Korea, Sri Lanka, Thailand, Timor-Leste, Tonga, Vanuat and Vietnam.

Development comes a few weeks after global surgery led to Capture 2300 domains related to malicious software for theft of Lumma.

Information thefts, which are often sold on cybercriminals, are considered as steps for threat subjects to gain unauthorized access to target networks. These malware enables siphon’s browser account data, passwords, credit card data and cryptocurrency wallet data from infected machines.

Cybersecurity

The stolen monetized information in the form of magazines on different forums, which allows other subjects to pursue the following attacks, including ransom, data violations and compromise by email (BEC).

Singapore’s outdated band-IB, which was one of the private sector companies, which participated in the operation, stated that she had submitted an important mission related to users’ accounts, disturbed by malicious Chealer software such as Lumma, RisePro and Meta Chealer.

“Breck the powers and sensitive data obtained by cybercriminals through malicious Infosteale software are often the initial vectors for financial fraud and attacks,” said Dmitry Volkov, CEO of Group-IB.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025

AI AI agents work on secret accounts – learn how to fasten them in this webinar

June 12, 2025

Zero Press AI Vulnerability exposes Copilot Microsoft 365 data without interaction with users

June 12, 2025

Connecting to Turn Signing Signing Code Screenconnect with -wit security risks

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025

AI AI agents work on secret accounts – learn how to fasten them in this webinar

June 12, 2025

Zero Press AI Vulnerability exposes Copilot Microsoft 365 data without interaction with users

June 12, 2025

Connecting to Turn Signing Signing Code Screenconnect with -wit security risks

June 12, 2025

More than 80,000 Microsoft Entra ID credits, directed using an open source Teamfiltration tool

June 12, 2025

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.