The info-stealing trojan used SMS messages and lifted contact credentials to spread with unprecedented speed across Android devices globally since December 2020.
International law enforcement has taken down the infrastructure behind Flubot, a nasty piece of malware which had been spreading with unprecedented speed across Android devices globally since December 2020.
Europol revealed Wednesday that a collaboration between law enforcement in 11 countries led to the disruption of the Flubot network in early May by Dutch Police, or Politie, “rendering this strain of malware inactive,” according to the agency.
Law enforcement authorities of Australia, Belgium, Finland, Hungary, Ireland, Spain, Sweden, Switzerland, the Netherlands and the United States, coordinated by Europol’s European Cybercrime Centre (EC3), participated in the effort.
Specifically, EC3 teamed with national investigators in affected countries to establish a joint strategy and provided digital forensic support, as well as facilitated the exchange of operational information across various national entities, the agency said.
The international law-enforcement team will continue to seek the individuals behind the campaign, who are still at large, according to Europol.
Spreading Like Wildfire
Flubot spread via text messages that baited Android users into clicking on a link and installing an application to track