Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Authorities Takedown Malware Hiding Tools

June 2, 2025
Reading Time: 2 mins read
in News
Senators Urge CSRB Return For Salt Typhoon

A multinational law enforcement operation has successfully dismantled an online cybercrime syndicate that provided specialized services to threat actors. This syndicate offered tools that allowed malicious software to remain undetected by common security programs, posing a significant threat to cybersecurity worldwide. The U.S. Department of Justice announced that, on May 27, 2025, in cooperation with Dutch and Finnish authorities, they seized four domains and associated servers involved in these illicit activities. The domains, which include AvCheck[.]net and Cryptor[.]biz, now display a seizure notice. France and Germany also participated in this operation.

The Department of Justice explained that “crypting” refers to using software to make malware harder to detect, preventing antivirus programs from identifying and neutralizing it. The seized domains offered these crypting and counter-antivirus (CAV) services, enabling cybercriminals to obfuscate their malware and bypass security solutions. This, in turn, allowed unauthorized access to computer systems. Undercover purchases by authorities confirmed that these services were indeed used for cybercrime. Dutch officials described AvCheck as one of the largest CAV services in existence.

AvCheck[.]net promoted itself as a high-speed checker that allowed registered users:

Scan their files against 26 antivirus engines. It also enabled scanning of domains and IP addresses against 22 antivirus engines and various online blocklists. These domain seizures were part of Operation Endgame, a global effort launched in 2024 to dismantle cybercrime networks. This operation marks the fourth major action in recent times, following the takedown of Lumma Stealer and DanaBot, and the removal of hundreds of other domains used for delivering ransomware.

The FBI emphasized that cybercriminals go beyond merely creating malware, they refine it for maximum damage, leveraging counter-antivirus services to test and perfect their attacks. This helps malware slip past robust security systems and evade forensic analysis, ultimately allowing threat actors to cause significant disruption.

This development coincides with eSentire’s recent report on PureCrypter, a malware-as-a-service (MaaS) solution that distributes information stealers like Lumma. PureCrypter uses the ClickFix initial access vector and multiple advanced evasion techniques, underscoring the evolving threat landscape in the cybersecurity space.

Reference:

  • A multinational law enforcement operation has dismantled an online cybercrime syndicate that provided services for making malicious software undetectable
Tags: Cyber NewsCyber News 2025Cyber threatsJune 2025
ADVERTISEMENT

Related Posts

Niobium Raises 23 Million For FHE Tech

NCSC Warns Orgs Of Exposed Device Flaws

December 5, 2025
PRC Hackers Use BrickStorm In US

PRC Hackers Use BrickStorm In US

December 5, 2025
NCSC Warns Orgs Of Exposed Device Flaws

Hackers Accused Of Wiping 96 Databases

December 5, 2025
Niobium Raises 23 Million For FHE Tech

Niobium Raises 23 Million For FHE Tech

December 4, 2025
Defender Outage Disrupts Threat Alerting

Arizona AG Sues Temu Over Data Theft

December 4, 2025
Niobium Raises 23 Million For FHE Tech

Google Expands Android Scam Protection

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial