Operation Endgame: Burnaby, BC Resident Arrested As Cops Go After Individual Hackers

April 10, 2025 As part of Operation Endgame, international law enforcement agencies have arrested a Burnaby, British Columbia resident accused of operating a vast network of infected computers used to distribute malware. The arrest, announced by the Royal Canadian Mounted Police (RCMP), is one of several global actions targeting not just the creators of malware services, but also their customers—marking a major shift in how cybercrime is being prosecuted.

Operation Endgame is a sweeping joint effort involving Canada, the United States, and five European countries. Authorities have focused on dismantling major malware loaders—automated systems that deliver ransomware and other malicious tools—but they’re now going further. Investigators have started charging individuals who used services like the Smokeloader botnet to deploy attacks.

The large cybercriminal gangs act like franchises. They develop the tools to use in attacks and provide the means to collect ransoms, usually in bitcoin. But they rely on a network of individuals who actual perform the attacks. And unlike the major gangs who often hide in countries that protect them like Russia and China, these individuals are often within the reach of law enforcement. But it’s still a major piece of police work to find and prosecute these individuals.

“This investigation is a clear example of the global reach and cooperation needed to tackle transnational cybercrime,” said Supt. Adam MacIntosh of the RCMP’s Federal Policing Cybercrime Investigative Team. The Burnaby suspect allegedly controlled thousands of compromised systems that could be activated to spread malware. Their operation linked directly into the broader infrastructure used by cybercrime networks targeted in Endgame.

By pursuing both the suppliers and users of malware tools, police hope to shrink the cybercrime ecosystem from both ends. The message is clear: buying access to these services could now land you in the same legal jeopardy as building them. This evolution in enforcement could alter the risk calculation for anyone considering paying to launch a ransomware or malware campaign.

Top Stories

Related Articles

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

December 22, 2025 Apple is requiring iPhone users who have not upgraded to iOS 26 to update now after confirming more...

December 12, 2025 The United States has extradited a Ukrainian national accused of working with Russian-backed hacktivist groups that targeted more...

November 24, 2025 Google is rolling out its Gemini artificial intelligence assistant to vehicles equipped with Android Auto, promising a more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn