Dozens arrested across Asia in global infostealer malware crackdown

Avatar

A global law enforcement crackdown on information-stealing malware led to the arrest of 32 suspects and the dismantling of more than 20,000 malicious IP addresses and domains linked to cybercrime. 

The operation, which ran from January to April, led to the arrest of 18 suspects in Vietnam who were allegedly involved in illegal cyber activities, according to a Wednesday statement from Interpol. Vietnamese police also seized computers, SIM cards, cash and corporate documents in raids that uncovered a scheme to open and sell business accounts for criminal use.

Information-stealer malware is increasingly used by cybercriminals to extract sensitive data from infected devices, including login credentials, credit card information and cryptocurrency wallet details. This stolen data is often traded on underground forums and can be used to gain initial access to networks for ransomware attacks and financial fraud.

As part of the crackdown, police agencies across 26 countries, mostly in Asia, seized 41 servers and more than 100 gigabytes of stolen data linked to various infostealer variants. Authorities said they notified more than 216,000 victims of potential breaches, urging them to take protective steps such as changing passwords or freezing compromised accounts.

Hong Kong police also identified 117 command-and-control servers hosted across 89 internet service providers. These servers were allegedly used to coordinate a wide range of criminal campaigns, including phishing attacks and social media scams.

One of the private cybersecurity firms that helped with the operation, Singapore-based Group-IB, said it targeted malware variants such as Lumma, Risepro and Meta.

Earlier in May, law enforcement agencies coordinated a global takedown of infrastructure supporting the Lumma malware, which is capable of stealing passwords, credit card data, bank account details and cryptocurrency wallets.

As part of that operation, the authorities dismantled nearly 2,300 malicious domains that formed the backbone of Lumma’s infrastructure. Researchers said that while the takedown significantly disrupted Lumma, it did not permanently affect much of its Russia-hosted infrastructure.

In a separate operation last October, police also disrupted infrastructure and seized data associated with the Meta infostealer.

CybercrimeGovernmentNewsMalwareNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org

Next Post

Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts

Related Posts

Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapes

Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE-2024-0132 (CVSS score: 9.0) is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that could lead to a container escape attack and allow for
Avatar
Read More

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security software. To that effect, the U.S. Department of Justice (DoJ) said it seized four domains and their associated server facilitated the crypting service on May 27, 2025, in
Avatar
Read More

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers. The malicious activity has been codenamed RedisRaider by Datadog Security Labs. "RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,"
Avatar
Read More