US Wipes Out High-Tech Battlefield RAT; Key Operators Nabbed

February 12, 2024
1 min read

In a joint effort, federal authorities in the United States, Malta, and Nigeria have dismantled a major malware operation called Warzone RAT. This operation targeted a powerful tool used by cybercriminals to remotely access and steal data from victims’ computers. The authorities shut down websites used to sell the malware and arrested several key operators involved in its sale and support.

The authorities arrested Daniel Meli, 27, from Malta, and Prince Onyeoziri Odinakachi, 31, from Nigeria. Meli has been charged with causing unauthorized damage to protected computers, illegally selling an electronic interception device, and involvement in a conspiracy to commit various computer intrusion offenses. Odinakachi is facing indictment for computer intrusion, including gaining authorized access and causing unauthorized damage to protected computers. He offered online customer support to users of the Warzone RAT malware.

The multinational effort involved authorities from several countries, including Australia, Croatia, the Netherlands, Finland, Germany, Japan, Romania, and Canada. The FBI’s Cyber Division played a significant role in the operation and encourages individuals impacted by Warzone RAT compromises to file a report with the agency.

Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code