US Authorities Seize Websites Selling Malware, Arrests Made

U.S. authorities announced on Friday the seizure of websites involved in the sale of malicious software known as “Warzone RAT,” which cybercriminals used to pilfer data from victims’ computers. Additionally, two individuals—one from Malta and another from Nigeria—have been apprehended in connection with these activities.

According to federal prosecutors in Boston, four domains have been taken down, collectively offering the sale of malware capable of surreptitiously accessing individuals’ computers for nefarious purposes.

This remote access trojan enabled hackers to infiltrate file systems, capture screenshots, steal user credentials, record keystrokes, and even monitor computer users through their web cameras. Jodi Cohen, head of the FBI’s Boston office, described the malware as sophisticated and widespread, having infected computers globally.

Among those charged is Daniel Meli, a 27-year-old from Zabbar, Malta, accused of causing unauthorized damage to protected computers and engaging in other cyber-related offenses.

Almost four domains that were working with cybercriminals seized (Credits: Cybernews)

Prosecutors allege that since 2012, Meli has been selling malware products like the Warzone RAT through online hacking forums and offering instructional resources, including an eBook, for sale. The U.S. government is seeking his extradition.

Another individual facing charges is Prince Onyeoziri Odinakachi, a 31-year-old from Nigeria, who has been indicted in Boston for conspiracy to commit multiple computer intrusion offenses. According to the indictment, Odinakachi provided online customer support to users of the Warzone RAT malware from June 2019 to March 2023.

Defense attorneys for Meli and Odinakachi have not been identified at the time of reporting.