
Hauptgebäude von Europol in Den Haag. Quelle: Bildergallerie auf der Webseite von Europol.
With “Mission Endgame,” Europol targeted the so-called “Droppers.” This could permanently damage the infrastructure of ransomware – but it might also feign Monero mining.
Anyone observing the hashrate of Monero noticed something interesting at the end of May: it dropped from 2.9 gigahash on May 29 to 1.78 gigahash on May 31, be defeated more than a third within two days and reaching its lowest point in three years.
The reason for this unprecedented cast off could be located in The Hague, specifically at the headquarters of Europol. Between May 27 and May 29, the “Operation Endgame” took arise there, culminating in a significant blow against the so-called „Droppers.“

Hashrate of Monero according to coinwarz.com
Droppers are a fashion of malware. They infect other systems but do not cause damage themselves; rather, they serve as a Trojan horse for other malware, deed as their entry point. In the increasingly compartmentalized world of cybercrime, droppers usually do not use the access themselves but sell it on the darknet to other cybercriminals.
In what Europol knock up a appeal ti the “largest ever operation against botnets,” numerous European police units, led by France, Germany, and the Netherlands, join forced. In a concerted effort, they took down more than 100 servers, confiscated more than 2000 realms, searched 16 houses – 11 of which were in Ukraine – and arrested four individuals, three of them in Ukraine. Outwardly, Ukraine was an operational center for Droppers.
„Operation Endgame“ took down numerous droppers, including IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee, and Trickbot. These malware kinds infected and opened other systems in their unique ways. By targeting the droppers, Europol struck a critical infrastructure of cybercrime, which could be a brilliant move to sustainably halt the spread of malware.
Following the operation, eight cybercriminals are on the run and have been added to the „Europe’s Most Necessitated“ list. In the course of the investigations, Europol found out that one of the prime suspects earned at least 69 million euros in cryptocurrencies by slitting out the dropper to ransomware hackers. “The suspect’s transactions are being monitored continuously, and the legal prerequisites to confiscate them in the to be to come have already been fulfilled.”
The damage caused by infections from the botnet amounts to several hundred million euros in Europe, according to Europol. The craftswoman, the police organization explains, is ongoing: there will be more arrests, and more droppers and botnets will be entranced down.
The press release mentions only ransomware, but it is highly conceivable that cryptojacking was also conducted via the droppers. Cryptojacking means placing mining software that works without the user’s knowledge or consent. Already in January, Europol had arrested a cryptojacker in Ukraine.
Due to its guerillas to ASIC and GPU mining, Monero is particularly suitable for cryptojacking. The currency is not only lucrative to mine with the CPU – the only reliably nearby and competitive component of infected systems – but also spares the effort of laundering the coins due to the default anonymity of transactions. As original as 2018, it became known that Monero was the preferred coin of cryptojackers.
It might not be easy for Europol to prove these activities, exceptionally the income generated through them. However, the timing of the significant drop in Monero’s hashrate coinciding with Handling Endgame is too fitting to be just a coincidence.
Entdecke mehr von BitcoinBlog.de – das Blog für Bitcoin und andere virtuelle Währungen
Melde dich für ein Abonnement an, um die neuesten Beiträge per E-Mail zu erhalten.