Operation Endgame Dismantles Rhadamanthys Malware Network

Operation Endgame Dismantles Rhadamanthys Malware Network

As the digital battlefield of cybersecurity continues to evolve, few operations have struck as decisively against cybercrime as the recent takedown of the Rhadamanthys malware. Today, I’m sitting down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Rupert has been closely following these international efforts and is here to shed light on the intricate details of this operation, the broader impact of initiatives like Operation Endgame, and the ongoing fight against infostealer malware.

Can you walk us through the key events of the recent Rhadamanthys malware takedown?

Absolutely, Russell. The Rhadamanthys takedown was a major win for international law enforcement. Between November 10 and 13, coordinated raids dismantled the malware’s infrastructure, seizing over 1,000 servers. This wasn’t just a small sting—it impacted hundreds of thousands of infected computers worldwide, which held millions of stolen credentials. The scale of the operation was staggering, and it sent a clear message to cybercriminals that their networks aren’t untouchable.

What role did Operation Endgame play in making this takedown successful?

Operation Endgame was the backbone of this effort. It’s a collaborative initiative led by Europol and Eurojust, bringing together law enforcement from multiple countries to target cybercrime on a global scale. Launched in 2024, it has already gone after several major threats, including botnets like Elysium and other malware such as VenomRAT. Their ability to coordinate across borders and share intelligence is what makes takedowns like Rhadamanthys possible, disrupting not just the tech but also the trust within criminal networks.

How widespread was the Rhadamanthys malware before law enforcement stepped in?

It was incredibly pervasive. According to data from the Shadowserver Foundation, which supported the operation, there were over 525,000 infections recorded between March and November 2025, spanning 226 countries. That’s a massive footprint. The malware harvested over 86 million individual records—think personal data, login credentials, and financial information. It was a goldmine for cybercriminals and a nightmare for victims.

What do we know about the people and systems affected by this malware?

Most victims had no clue their systems were compromised. That’s the insidious nature of infostealers like Rhadamanthys—they operate silently in the background. The main suspect behind this operation allegedly accessed over 100,000 cryptocurrency wallets, which could be worth millions of euros. Beyond that, personal and sensitive data were stolen, leaving countless individuals vulnerable to identity theft or financial loss. It’s a stark reminder of how much is at stake in these attacks.

How did the Rhadamanthys malware administrator react when the heat was on?

On November 11, just as the raids were kicking off, the administrator sent a message to their customers, basically telling them to shut down operations for safety reasons. Shortly after, their dark web site went offline—completely dark. It’s unclear whether the administrator or their network of clients have been apprehended yet, but that sudden move suggests they knew the walls were closing in. It’s a classic case of panic setting in when law enforcement strikes.

Officials released an animated video as part of this operation. Can you explain what that was about?

Yeah, that video was a clever psychological tactic by Operation Endgame. It portrayed the Rhadamanthys administrator as someone who was double-crossing their own customers—skimming the most valuable data, like cryptocurrency keys, for personal gain while passing off less useful info to their buyers. The message was clear: even in the criminal underworld, there’s no honor among thieves. It’s meant to sow distrust within these networks and maybe even encourage some insiders to turn on each other. Plus, it called for public help in identifying those involved, which adds another layer of pressure.

What is your forecast for the future of international efforts against cybercrime like this?

I think we’re going to see even more coordinated operations like Endgame in the coming years. Cybercrime is borderless, so law enforcement has to be too. The success of takedowns like Rhadamanthys shows that when agencies pool resources and intelligence, they can hit hard. But the flip side is that cybercriminals adapt quickly—they’ll find new ways to hide their infrastructure or encrypt their communications. My forecast is a bit of a cat-and-mouse game, but with initiatives like Operation Endgame gaining momentum, I’m optimistic that the good guys can stay a step ahead. It’s going to be a long fight, though, and public awareness will play a huge role in reducing the number of victims.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later