Blog

Operation ENDGAME Dismantled Global Ransomware Infrastructure

Criticality level: Informational 

THREAT BRIEF: Operation ENDGAME Dismantled Global Ransomware Infrastructure 

What is the situation?   

Operation ENDGAME, a coordinated international cybercrime operation, has disrupted ransomware infrastructure globally. It is an ongoing, large-scale, long-term initiative led by multiple law enforcement agencies worldwide. It targets services and infrastructures that facilitate or provide direct access to ransomware.  

The operation, spearheaded by Europol and Eurojust, successfully dismantled a significant criminal network by taking down over 300 servers and 650 domains associated with malware distribution and ransomware attacks. As part of the ongoing enforcement efforts, authorities issued 20 international arrest warrants as part of the crackdown. Additionally, €3.5 million in cryptocurrency was seized during the action week, bringing the total amount seized during the Operation Endgame to more than €21.2 million.  

The operation centered on initial access to malware, defined as the tools cybercriminals use to infiltrate systems undetected before deploying ransomware. Neutralized strains include Bumblebee, Lactrodectus, Qakbot, Hijackloader, DanaBot, Trickbot, and Warmcookie, all commonly used in ransomware-as-a-service schemes. By disabling these entry points, investigators have effectively disrupted the initial phase of the cyberattack chain, significantly damaging the entire cybercrime-as-a-service ecosystem.  

Several key suspects behind the malware operations are now subject to international and public appeals. The German authorities will publish 18 of them on the EU Most Wanted list as of 23 May.  

What should you do?   

Organizations must remain vigilant and continuously adapt their defenses to counter the evolving threat of ransomware. 

  • Deploy Endpoint Detection and Response (EDR): EDR solutions use heuristics and behavioral analysis to detect and block suspicious activity. Ensure EDR is deployed across the entire environment for maximum visibility and protection. 
  • User Awareness Training: Conduct regular training focused on recognizing phishing lures, suspicious attachments, malvertising, and other common initial access vectors used by threat actors. 
  • Vulnerability Management Program: Establish a comprehensive vulnerability management program that prioritizes critical and externally facing assets. Patch vulnerabilities based on severity and current threat actor exploitation trends. 

Have you registered for our next event?