On Wednesday, Interpol announced the dismantling of more than 20,000 malicious IP addresses or domains related to 69 malware options that theft of information.
Joint action, codan is named The operation is safeoccurred from January to April 2025 and participated law enforcement agencies From 26 countries to identify servers, displaying physical networks and execution of purposeful removal.
“These coordinated efforts have led to the removal of 79 percent of the identified IP IP”, interpol – Note In a statement. “The participating countries have reported 41 servers and more than 100 GB of data, as well as the arrest of 32 suspects related to illegal cyber activity.”
Vietnam authorities arrested 18 suspects and seized devices, sim cards, documents for business registration and money worth $ 11,500. Further raids led to the arrest of 12 more people on Sri Lanka and two people in Nauru.
Police in Hong Kong, for Interpol, identified 117 servers of teams and control, located in 89 Internet service providers. These servers were designed to act as a center for launching and management by malicious companies such as phishing, internet fraud and social media scams.
Countries Involved in Operation Secure Include Brunei, Cambodia, Fiji, Hong Kong (China), India, Indonesia, Japan, Kazakhstan, Kiribati, Laos, Macau (China), Malaysia, Maldives, Nauru, Nauru, Nauru, Nauru Papua New Guinea, Philippines, Samoa, Singapore, Solomon Islands, South Korea, Sri Lanka, Thailand, Timor-Leste, Tonga, Vanuat and Vietnam.
Development comes a few weeks after global surgery led to Capture 2300 domains related to malicious software for theft of Lumma.
Information thefts, which are often sold on cybercriminals, are considered as steps for threat subjects to gain unauthorized access to target networks. These malware enables siphon’s browser account data, passwords, credit card data and cryptocurrency wallet data from infected machines.
The stolen monetized information in the form of magazines on different forums, which allows other subjects to pursue the following attacks, including ransom, data violations and compromise by email (BEC).
Singapore’s outdated band-IB, which was one of the private sector companies, which participated in the operation, stated that she had submitted an important mission related to users’ accounts, disturbed by malicious Chealer software such as Lumma, RisePro and Meta Chealer.
“Breck the powers and sensitive data obtained by cybercriminals through malicious Infosteale software are often the initial vectors for financial fraud and attacks,” said Dmitry Volkov, CEO of Group-IB.