Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Global Crackdown on Rhadamanthys, Venom RAT, and Elysium Botnet: A New Era in Cybersecurity Operations




In a major operation, law enforcement agencies around the world have joined forces to take down three large-scale cybercrime infrastructures linked to Rhadamanthys Stealer, Venom RAT, and the Elysium botnet. The global crackdown highlights the ever-evolving nature of cyber threats and underscores the need for continued vigilance and cooperation among governments, financial institutions, and other stakeholders to prevent illicit transactions from taking place.

  • Law enforcement agencies worldwide joined forces to dismantle three large-scale cybercrime infrastructures.
  • Rhadamanthys Stealer, a sophisticated infostealer, was targeted for its ability to steal sensitive data and access cryptocurrency wallets.
  • Venom RAT and the Elysium botnet were also part of the operation, with significant efforts made to disrupt their activities.
  • The global collaboration highlights the need for continued vigilance and cooperation to prevent cybercrime.
  • Effective collaboration between law enforcement agencies is crucial in staying one step ahead of evolving cyber threats.



  • In a recent development that highlights the ever-evolving nature of cyber threats, law enforcement agencies from around the world have joined forces to dismantle three large-scale cybercrime infrastructures. The operation, led by Europol and Eurojust, aimed to disrupt the activities of Rhadamanthys Stealer, Venom RAT, and the Elysium botnet, all of which had been linked to various forms of malware attacks.

    At the heart of this operation was Rhadamanthys Stealer, a sophisticated infostealer that had been designed to steal sensitive data from compromised systems. According to Europol, the malware had been observed by security researchers as recently as last month, with recent updates adding support for collecting device and web browser fingerprints in addition to its existing capabilities.

    One of the most significant aspects of Rhadamanthys Stealer was its ability to gain unauthorized access to cryptocurrency wallets belonging to victims. With this level of control over financial data, it is estimated that the malware could potentially amount to millions of euros in stolen funds.

    The involvement of Venom RAT, another sophisticated piece of malware, added an additional layer of complexity to the operation. According to reports, a main suspect behind the malware was arrested in Greece on November 3, with law enforcement agencies from across Europe participating in the takedown effort.

    However, it is still unclear whether the Elysium botnet, which Europol also targeted as part of Operation Endgame, refers to the same proxy botnet service known as RHAD security (also referred to as Mythical Origin Labs). Despite this ambiguity, the overall impact of the operation cannot be overstated. With hundreds of thousands of infected computers containing stolen credentials, and 20 domains seized by law enforcement, the disruption sent a clear message to cybercriminals that their activities would no longer go unchecked.

    In addition to its efforts against Rhadamanthys Stealer and Venom RAT, Europol also highlighted the work of authorities from other countries, including Australia, Canada, Denmark, France, Germany, Greece, Lithuania, the Netherlands, and the U.S. These agencies came together as part of a broader effort to combat ransomware enablers worldwide.

    The recent takedown of Rhadamanthys Stealer, Venom RAT, and the Elysium botnet marks an important development in the ongoing struggle against cybercrime. As these types of threats continue to evolve at a rapid pace, it is clear that effective collaboration between law enforcement agencies will be crucial to staying one step ahead of the bad actors.

    Furthermore, the involvement of cryptocurrency in malicious activities underscores the need for continued vigilance and cooperation among governments, financial institutions, and other stakeholders to prevent illicit transactions from taking place. By fostering an environment where cybercrime can no longer thrive, we can begin to rebuild trust and ensure a safer digital future for all.

    In light of this operation, it is also worth noting that Check Point recently published a report highlighting the growing sophistication of malware threats such as Rhadamanthys Stealer. According to the analysis, the latest version of Rhadamanthys had incorporated several mechanisms designed to evade detection by security software, making it increasingly difficult for users to protect themselves against this type of threat.

    The global crackdown on Rhadamanthys Stealer, Venom RAT, and the Elysium botnet serves as a reminder that cyber threats are constantly evolving, requiring constant vigilance from individuals and organizations alike. By staying informed and working together, we can ensure that future generations will be spared the devastating consequences of these types of attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Global-Crackdown-on-Rhadamanthys-Venom-RAT-and-Elysium-Botnet-A-New-Era-in-Cybersecurity-Operations-ehn.shtml

  • https://thehackernews.com/2025/11/operation-endgame-dismantles.html

  • https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys

  • https://thehackernews.com/2025/10/rhadamanthys-stealer-evolves-adds.html

  • https://www.bleepingcomputer.com/news/security/police-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/

  • https://apt.etda.or.th/cgi-bin/listgroups.cgi?t=VenomRAT&n=1

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/

  • https://securityboulevard.com/2024/02/feds-disrupt-botnet-used-by-russian-hackers-apt28/

  • https://iottechnews.com/news/us-disrupts-botnet-russia-linked-apt28-threat-group/

  • https://blog.checkpoint.com/research/rhadamanthys-0-9-2-a-stealer-that-keeps-evolving/


  • Published: Thu Nov 13 05:58:49 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us