Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence
  • The Hacker News

Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence

[email protected] The Hacker News Published: April 10, 2025 | Updated: April 10, 2025 4 min read
0 views
Europol Arrests Five SmokeLoader Clients

Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained at least five individuals.

“In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as ‘Superstar,’ faced consequences such as arrests, house searches, arrest warrants or ‘knock and talks,'” Europol said in a statement.

Superstar is alleged to have run a pay-per-install service that enabled its customers to gain unauthorized access to victim machines, using the loader as a conduit to deploy next-stage payloads of their choice.

According to the European law enforcement agency, the access afforded by the botnet was used for various purposes such as keylogging, webcam access, ransomware deployment, and cryptocurrency mining.

The latest action, part of an ongoing coordinated exercise called Operation Endgame, which led to the dismantling of online infrastructure associated with multiple malware loader operations like IcedID, SystemBC, PikaBot, SmokeLoader, Bumblebee, and TrickBot last year.

Canada, the Czech Republic, Denmark, France, Germany, the Netherlands, and the United States participated in the follow-up effort that’s meant to focus on the “demand side” of the cybercrime ecosystem.

Cybersecurity

Authorities, per Europol, tracked down the customers who were registered in a database that was previously seized, linking their online personas to real-life individuals and calling them for questioning. An unspecified number of suspects are believed to have opted to cooperate and have their personal devices examined to collect digital evidence.

“Several suspects resold the services purchased from SmokeLoader at a markup, thus adding an additional layer of interest to the investigation,” Europol said. “Some of the suspects had assumed they were no longer on law enforcement’s radar, only to come to the harsh realisation that they were still being targeted.”

Malware Loaders Come in Different Forms

The development comes as Broadcom-owned Symantec revealed details of a phishing campaign that employs the Windows screensaver (SCR) file format to distribute a Delphi-based malware loader named ModiLoader (aka DBatLoader and NatsoLoader) on victims’ machines.

It also coincides with an evasive web campaign that tricks users into running malicious Windows installer (MSI) files to deploy another loader malware referred to as Legion Loader.

“This campaign uses a method called ‘pastejacking‘ or ‘clipboard hijacking’ because viewers are instructed to paste content into a Run window,” Palo Alto Networks Unit 42 said, adding it leverages several cloaking strategies to evade detection through CAPTCHA pages and disguising malware download pages as blog sites.

Phishing campaigns have also been a delivery vehicle for Koi Loader, which is then used to download and execute an information stealer called Koi Stealer as part of a multi-stage infection sequence.

“The utilization of Anti-VM capabilities by malware like Koi Loader and Koi Stealer highlights the capability of modern threats to evade analysis and detection by analysts, researchers, and sandboxes,” eSentire said in a report published last month.

And that’s not all. Recent months have once again witnessed the return of GootLoader (aka SLOWPOUR), which is being spread via sponsored search results on Google, a technique first spotted in early November 2024.

The attack targets users searching for “non disclosure agreement template” on Google to serve bogus ads that, when clicked, are redirected to a site (“lawliner[.]com”) where they are asked to enter their email addresses to receive the document.

Cybersecurity

“Shortly after they enter their email, they will receive an email from lawyer@skhm[.]org, with a link to their requested Word document (DOCX),” according to a security researcher who goes by the name GootLoader and has closely monitored the malware loader for several years.

“If the user passed all of their gates, they will download a zipped JavaScript file. When the user unzips and executes the JavaScript file, the same GootLoader behavior occurs.”

Also spotted is a JavaScript downloader known as FakeUpdates (aka SocGholish) that’s typically propagated via social engineering ploys that deceive users into installing the malware by disguising as a legitimate update for web browsers like Google Chrome.

“Attackers distribute malware using compromised resources, injecting malicious JavaScript into vulnerable sites to fingerprint hosts, perform eligibility checks, and display fake update pages,” Google said. “The malware is commonly delivered via drive-by downloads. The malicious JavaScript acts as a downloader, delivering additional malware.”

The fake browser update attack pathway has also been observed distributing two other JavaScript malware families called FAKESMUGGLES, which is so named for the use of HTML smuggling to deliver next-stage payloads such as NetSupport Manager, and FAKETREFF, which communicates with a remote server to retrieve additional payloads like DarkGate and send basic host information.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: ‘AkiraBot’ Spammed 80,000 Websites With AI-Generated Messages
Next: Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

Author's Other Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1

Related Stories

whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
hacked.jpg
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

[email protected] The Hacker News December 2, 2025 0 0
npm-mal.jpg
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

[email protected] The Hacker News December 2, 2025 0 1
iran-hacking.jpg
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

[email protected] The Hacker News December 2, 2025 0 0
SecAlerts.jpg
  • The Hacker News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

[email protected] The Hacker News December 2, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.