Security Experts:

Connect with us

Hi, what are you looking for?



Avast, French Police Remove Retadup Malware From 850,000 PCs

Cybersecurity firm Avast and French police have neutralized the Retadup malware on over 850,000 computers after taking control of its command and control (C&C) server.

Cybersecurity firm Avast and French police have neutralized the Retadup malware on over 850,000 computers after taking control of its command and control (C&C) server.

Retadup is a worm that has been around since at least 2017. It has been used by cybercriminals to deliver information stealers, ransomware and cryptocurrency miners. In recent months, it was mainly used to install Monero cryptocurrency miners on devices located in Latin America.

Avast said it started closely monitoring the activities of the threat actor behind Retadup in March 2019. An analysis revealed that the C&C communication protocol used by the malware had a design flaw that could be exploited by someone with access to the C&C server to remove the malware from compromised machines.

After determining that the Retadup C&C infrastructure was mostly located in France, Avast reached out to the Cybercrime Fighting Center (C3N) of the French National Gendarmerie. The law enforcement agency obtained an image of the C&C server from the company providing hosting services to the cybercriminals, which allowed Avast to collect some data about the victims.

The company was only provided a C&C snapshot that did not contain any private information about victims, but there was enough data to determine that there were over 850,000 infected PCs, that a vast majority were located in Latin America, and that more than 85% of victims did not have any third-party security software installed. Peru accounted for the highest number of infections, followed by Venezuela, Bolivia, Mexico and Ecuador.

Avast’s investigation also revealed that the individual who likely developed Retadup created a Twitter account in April 2018 and publicly took credit for the malware after Trend Micro published a blog post describing the threat’s new variants and features. The Twitter account in question is still active today, but it hasn’t tweeted since April 2018.

After in July 2019 French police obtained approval from prosecutors to go after Retadup, the attackers’ C&C server was replaced with a server that Avast had set up to exploit the C&C protocol flaw.

“The disinfection server responded to incoming bot requests with a specific response that caused connected pieces of the malware to self-destruct,” Avast’s Jan Vojtěšek explained in a blog post on Wednesday.

The FBI was also notified and helped take down some parts of the C&C infrastructure that were hosted in the United States. Avast said the cybercriminals lost control over their bots by July 8.

“Since it was the C&C server’s responsibility to give mining jobs to the bots, none of the bots received any new mining jobs to execute after this takedown. This meant that they could no longer drain the computing power of their victims and that the malware authors no longer received any monetary gain from mining,” Vojtěšek said.

Related: Andromeda Botnet to Die Slow, Painful Death

Related: Hamas-Linked Threat Actor’s Infrastructure Disrupted

Related: U.S. Disrupts Russian Botnet of 500,000 Hacked Routers

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.