FBI Shuts Down Warzone RAT; Cybercriminals Arrested

 

In a major victory against cybercrime, the FBI has successfully taken down the Warzone RAT malware operation. This operation led to the arrest of two individuals involved in the illicit activities. One of the suspects, 27-year-old Daniel Meli from Malta, was apprehended for his role in the distribution of Warzone RAT, a notorious remote access trojan used for various cybercrimes.

Warzone RAT, also known as ‘AveMaria,’ surfaced in 2018 as a commodity malware offering a range of malicious features. These include bypassing User Account Control (UAC), stealing passwords and cookies, keylogging, remote desktop access, webcam recording, and more. Meli’s arrest took place last week in Malta following an indictment issued by U.S. law enforcement authorities on December 12, 2023.

The charges against Meli include unauthorised damage to protected computers, illegally selling and advertising an electronic interception device, and participating in a conspiracy to commit several computer intrusion offences. He has been involved in the cybercrime space since at least 2012, starting at the age of 15 by selling hacking ebooks and the Pegasus RAT for a criminal group called ‘Skynet-Corporation.’

Simultaneously, another key figure linked to Warzone RAT, Prince Onyeoziri Odinakachi, 31, from Nigeria, was arrested for providing customer support to cybercriminals purchasing access to the malware. Federal authorities in Boston seized four domains, including the primary website “warzone.ws,” associated with Warzone RAT.

Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: