Law enforcement authorities have detained five individuals in a follow-up operation targeting the customers of the SmokeLoader malware. The suspects were identified from a previously seized database, some of whom were found to have resold the services at a higher price. The operation is an ongoing initiative called Operation Endgame that last year dismantled infrastructures linked to various malware loaders. The malware customers utilized the access for a variety of criminal activities including keylogging, webcam access, ransomware deployment, and cryptocurrency mining.

Valley Man Who Sold Spying Malware, Pleads To Conspiracy
A man from Van Nuys has confessed to conspiring to sell malware, known as Hive RAT, that allowed buyers to illegally access computers, stealing personal