A landmark international law enforcement effort, named Operation Endgame, has successfully dismantled the infrastructure of several prominent malware-as-a-service (MaaS) operations. Coordinated by Europol between November 10 and 14, 2025, the operation targeted the Rhadamanthys information stealer, the VenomRAT remote access trojan, and the Elysium botnet. The coordinated action involved authorities from 11 nations and resulted in the seizure of over 1,025 servers, the disruption of 20 domains, and one key arrest. This takedown represents a significant blow to the cybercrime ecosystem that relies on these tools for initial access, data theft, and further malware deployment.
Operation Endgame was a meticulously planned and executed takedown targeting the core infrastructure that enabled thousands of cybercriminals globally. The three primary targets were:
The operation was a collaborative effort involving law enforcement from the US, UK, Germany, France, the Netherlands, and others, with crucial intelligence support from private sector partners like Proofpoint, CrowdStrike, and Have I Been Pwned.
The targeted malware families employed common but effective TTPs to achieve their objectives. The typical attack chain involved:
T1566 - Phishing): Malware was often distributed via phishing emails containing malicious attachments or links.T1204.002 - Malicious File): The user is tricked into executing the malware payload.T1555 - Credentials from Password Stores): Rhadamanthys would systematically harvest credentials from web browsers, email clients, and FTP applications.T1560 - Archive Collected Data): Stolen data was staged and compressed for exfiltration.T1071.001 - Web Protocols): Both Rhadamanthys and VenomRAT communicated with C2 servers over standard web protocols (HTTP/HTTPS) to receive commands and exfiltrate data.T1486 - Data Encrypted for Impact): While not their primary function, RATs like VenomRAT are frequently used to deploy secondary payloads like ransomware.The impact of these malware operations was vast. The seized infrastructure revealed over 525,000 infections across 226 countries between March and November 2025 alone, with 86 million individual records collected. The financial impact is estimated to be in the millions of euros, particularly from drained cryptocurrency wallets. The disruption of these services will have a significant, albeit potentially temporary, effect on the cybercrime economy, forcing many threat actors to seek alternative tools and infrastructure. As part of the remediation, 2 million email addresses and 7.4 million passwords were shared with the Have I Been Pwned service to notify victims.
No specific file hashes or IP addresses were released in the public announcements. The focus was on the takedown of the backend infrastructure.
While the primary C2 infrastructure for these families has been dismantled, copycat versions or resurgent operations may appear.
Network Traffic Analysis to identify anomalous outbound connections.Process Analysis.M1017 - User Training): Since phishing is the primary initial access vector, robust and continuous security awareness training is crucial to teach employees how to identify and report suspicious emails.M1032 - Multi-factor Authentication): Enforce MFA on all external and internal services, especially for email, VPN, and critical applications. This is the single most effective control against credential theft.M1049 - Antivirus/Antimalware.Train users to recognize and report phishing attempts, which are the primary delivery vector for this type of malware.
Enforce MFA to prevent stolen credentials from being used to access corporate resources.
Mapped D3FEND Techniques:
Use modern endpoint protection (EDR/XDR) to detect and block the execution and malicious behaviors of infostealers and RATs.
Use web filters to block access to known malicious domains and C2 infrastructure.
The core threat from infostealers like Rhadamanthys is credential theft. The single most effective countermeasure is to render those stolen credentials useless by enforcing Multi-Factor Authentication (MFA) across all enterprise applications, especially for remote access (VPN), cloud services (O365, G-Suite), and administrative interfaces. Prioritize phishing-resistant MFA, such as FIDO2 security keys, over SMS or push-based methods, as these can be vulnerable to MFA fatigue attacks. Even if an attacker successfully steals a user's password using Rhadamanthys, mandatory MFA will prevent them from logging into the account, effectively stopping the attack chain at the credential access stage. This is a foundational security control that directly mitigates the primary impact of this malware family.
Implement robust inbound traffic filtering at the network edge and email gateway. For email, this involves using an advanced threat protection solution that can perform sandboxing of attachments and URL rewriting/analysis for links. Since Rhadamanthys and VenomRAT are often delivered via phishing, blocking the initial malicious email is paramount. Configure email filters to block executables, scripts, and password-protected archives. For network traffic, use a next-generation firewall (NGFW) and web proxy with up-to-date threat intelligence feeds to block connections from known malicious IP addresses and domains associated with malware distribution infrastructure. This creates a critical defensive layer that prevents the malware from ever reaching the endpoint.
Even if an endpoint is compromised by VenomRAT or Rhadamanthys, the attack can be contained by preventing the malware from communicating with its C2 server. Implement egress filtering rules on firewalls to deny all outbound traffic by default, only allowing connections to known-good destinations on approved ports and protocols. Pay special attention to traffic from user subnets. By blocking unauthorized outbound connections over HTTP/HTTPS to uncategorized or newly-registered domains, you can prevent the malware from exfiltrating stolen data or receiving commands. This technique contains the breach, providing the security team with time to detect and respond to the initial infection before significant damage occurs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats