Rhadamanthys infostealer disrupted as cybercriminals lose server access

  • Rhadamanthys infostealer disrupted as cybercriminals lose server access

    Hands reaching through a screen to steal data

    The Rhadamanthys infostealer operation has been disrupted, with numerous “customers” of the malware-as-a-service reporting that they no longer have access to their servers.

    Rhadamanthys is an infostealer malware that steals credentials and authentication cookies from browsers, email clients, and other applications. It is commonly distributed through campaigns promoted as software cracks, YouTube videos, or malicious search advertisements.

    The malware is offered on a subscription model, where cybercriminals pay the developer a monthly fee for access to the malware, support, and a web panel used to collect stolen data.

    Subscription plans for the Rhadamanthys malware operation

    According to cybersecurity researchers known as g0njxa and Gi7w0rm, who both monitor malware operations like Rhadamanthys, report that cybercriminals involved in the operation claim that law enforcement gained access to their web panels.

    In a post on a hacking forum, some customers state that they lost SSH access to their Rhadamanthys web panels, which now require a certificate to log in rather than their usual root password.

    "If your password cannot log in. The server login method has also been changed to certificate login mode, please check and confirm, if so, immediately reinstall your server, erase traces, the German police are acting," wrote one of the customers.

    Post to hacking forum

    Another Rhadamanthys subscriber claimed they were having the same issues, with their server's SSH access now also requiring certificate-based logins.

    "I confirm that guests have visited my server and the password has been deleted.rootServer login became strictly certificate-based, so I had to immediately delete everything and power down the server. Those who installed it manually were probably unscathed, but those who installed it through the "smart panel" were hit hard," wrote another subscriber.

    A message from the Rhadamanthys developer says they believe German law enforcement is behind the disruption, as web panels hosted in EU data centers had German IP addresses logging in before the cybercriminals lost access.

    Post by developer

    G0njxa told BleepingComputer that the Tor onion sites for the malware operation are also offline but do not currently have a police seizure banner, so it is unclear who exactly is behind the disruption.

    Multiple researchers who have spoken to BleepingComputer believe this disruption could be related to an upcoming announcement from Operation Endgame, an ongoing law enforcement action targeting malware-as-a-service operations.

    Operation Endgame has been behind numerous disruptions since it launched, including against ransomware infrastructure, and the AVCheck site, SmokeLoader, DanaBot, IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC malware operations.

    The Operation Endgame website currently has a timer stating that new action will be disclosed on Thursday.

    Rhadamanthys infostealer disrupted as cybercriminals lose server access
    The Rhadamanthys infostealer operation has been disrupted, with numerous "customers" of the malware-as-a-service reporting that they no longer have access to…
    www.bleepingcomputer.com

    “Secure Your World, Protect Your Life.”
    “Empowering Each Other to Stay Secure.”

  • Rhadamanthys infostealer disrupted as cybercriminals lose server access The Rhadamanthys infostealer operation has been disrupted, with numerous “customers” of the malware-as-a-service reporting that they no longer have access to their servers. Rhadamanthys is an infostealer malware that steals credentials and authentication cookies from browsers, email clients, and other applications. It is commonly distributed through campaigns promoted as software cracks, YouTube videos, or malicious search advertisements. The malware is offered on a subscription model, where cybercriminals pay the developer a monthly fee for access to the malware, support, and a web panel used to collect stolen data. According to cybersecurity researchers known as g0njxa [URL:https://x.com/g0njxa] and Gi7w0rm [URL:

    External Content x.com
    Content embedded from external sources will not be displayed without your consent.
    Through the activation of external content, you agree that personal data may be transferred to third party platforms. We have provided more information on this in our privacy policy.
    ], who both monitor malware operations like Rhadamanthys, report that cybercriminals involved in the operation claim that law enforcement gained access to their web panels. In a post on a hacking forum, some customers state that they lost SSH access to their Rhadamanthys web panels, which now require a certificate to log in rather than their usual root password. "If your password cannot log in. The server login method has also been changed to certificate login mode, please check and confirm, if so, immediately reinstall your server, erase traces, the German police are acting," wrote one of the customers. Another Rhadamanthys subscriber claimed they were having the same issues, with their server's SSH access now also requiring certificate-based logins. "I confirm that guests have visited my server and the password has been deleted.rootServer login became strictly certificate-based, so I had to immediately delete everything and power down the server. Those who installed it manually were probably unscathed, but those who installed it through the "smart panel" were hit hard," wrote another subscriber. A message from the Rhadamanthys developer says they believe German law enforcement is behind the disruption, as web panels hosted in EU data centers had German IP addresses logging in before the cybercriminals lost access. G0njxa told BleepingComputer that the Tor onion sites for the malware operation are also offline but do not currently have a police seizure banner, so it is unclear who exactly is behind the disruption. Multiple researchers who have spoken to BleepingComputer believe this disruption could be related to an upcoming announcement from Operation Endgame [URL:https://operation-endgame.com/], an ongoing law enforcement action targeting malware-as-a-service operations. Operation Endgame has been behind numerous disruptions since it launched, including against ransomware infrastructure [URL:https://www.bleepingcomputer.com/news/security/…hain-crackdown/], and the AVCheck site [URL:https://www.bleepingcomputer.com/news/security/…cybercriminals/], SmokeLoader [URL:https://www.bleepingcomputer.com/news/security/…seizes-servers/], DanaBot [URL:https://www.bleepingcomputer.com/news/security/…-added-in-2022/], IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC [URL:https://www.bleepingcomputer.com/news/legal/eur…loader-botnets/] malware operations. The Operation Endgame website currently has a timer stating that new action will be disclosed on Thursday. https://www.bleepingcomputer.com/news/security/…-server-access/

    Hi Negan,

    This is a significant development in the fight against cybercrime. The disruption of the Rhadamanthys infostealer operation shows that law enforcement is making strides in taking down malware-as-a-service platforms. It's a reminder for all of us to stay vigilant and ensure our systems are secure. If you have any further insights or questions about this situation, feel free to share. We're all here to support each other in staying safe online.

Participate now!

Don’t have an account yet? Register yourself now and be a part of our community!