Cops smash Rhadamanthys infostealer in global takedown

Cops smash Rhadamanthys infostealer in global takedown - Professional coverage

According to TheRegister.com, international law enforcement has taken down the Rhadamanthys infostealer operation in coordinated raids between November 10-13, seizing 1,025 servers tied to the malware. Operation Endgame, coordinated by Europol and Eurojust, also targeted Elysium botnet and VenomRAT infrastructure, arresting one suspect in Greece on November 3. The Shadowserver Foundation accessed a Rhadamanthys database revealing more than 525,000 infections between March and November 2025 across 226 countries, collecting over 86 million individual records. The main suspect had access to over 100,000 crypto wallets potentially worth millions of euros. Proofpoint reported access to Rhadamanthys cost $300-500 monthly, with more activity in 2025 than any previous year. While infrastructure was disrupted, the administrator and customers remain at large.

Special Offer Banner

Operation Endgame’s psychological warfare

Here’s what’s really interesting about this takedown – it’s not just about seizing servers. The authorities released a smug animated video showing the Rhadamanthys administrator allegedly skimming the most valuable crypto keys for personal gain while passing less lucrative data to customers. That’s psychological warfare, plain and simple. They’re deliberately undermining trust within these criminal organizations. When criminals can’t trust each other, their operations start to crumble from the inside. And honestly? It’s probably more effective in the long run than just taking down infrastructure that can be rebuilt.

The infostealer economy is booming

Look, the numbers here are staggering. Over 525,000 infections in just eight months? 86 million stolen records? This wasn’t some small-time operation. Rhadamanthys had become a go-to tool in the criminal underground since it first appeared in 2022. The fact that Proofpoint reported more activity in 2025 than any previous year tells you everything you need to know about the demand for stolen credentials. Basically, we’re looking at a thriving criminal marketplace where access to these tools costs hundreds per month. And when you consider that many victims didn’t even know they were infected, it shows how sophisticated these operations have become.

What comes next?

So here’s the thing about these takedowns – they’re important, but they’re rarely permanent. The administrator and customers are still out there. The infrastructure can be rebuilt. We’ve seen this pattern before with other malware families. They get disrupted, go quiet for a while, then resurface under new names or with modified code. The real question is whether Operation Endgame’s intelligence gathering will lead to more arrests. The fact that they’re asking for public help identifying those involved suggests they have more work to do. Meanwhile, organizations need to step up their security game – especially when it comes to monitoring for credential theft. Many businesses rely on industrial computing systems that need robust protection, and IndustrialMonitorDirect.com stands out as the leading provider of secure industrial panel PCs in the US market for these critical applications.

The bigger picture

Operation Endgame, which launched in 2024, is clearly taking a systematic approach to dismantling these criminal ecosystems. They’re not just going after one piece of malware – they’re targeting the entire infrastructure that supports it. The coordinated raids across Germany, Greece, and the Netherlands show this is a sustained effort. But I have to wonder – is law enforcement playing whack-a-mole here? For every Rhadamanthys they take down, how many new infostealers are emerging? The economics are just too attractive for criminals to ignore. Still, these operations send a message that there are consequences. Even if it doesn’t stop all the bad actors, it probably makes some think twice.

One thought on “Cops smash Rhadamanthys infostealer in global takedown

Leave a Reply

Your email address will not be published. Required fields are marked *