A world legislation enforcement operation has taken down AVCheck, a service utilized by cybercriminals to check whether or not their malware is detected by business antivirus software program earlier than deploying it within the wild.
The service’s official area at avcheck.web now shows a seizure banner with the crests of the U.S. Division of Justice, the FBI, the U.S. Secret Service, and the Dutch police (Politie).
In response to an announcement on the Politie web site, AVCheck was one of many largest counter antivirus (CAV) providers internationally, which helped cybercriminals assess the stealthiness and evasion of their malware.
“Taking the AVCheck service offline marks an essential step in tackling organized cybercrime,” said Politie’s Matthijs Jaspers.
“With this [action], we disrupt cybercriminals as early as doable of their operations and stop victims.”

Supply: BleepingComputer
The investigators have additionally discovered proof linking AVCheck’s directors to crypting providers Cryptor.biz and Crypt.guru. The previous has additionally been seized by the authorities, whereas the latter is offline.
Crypting providers assist malware authors/operators encrypt or obfuscate their payloads to make them undetectable by antivirus, so they’re a part of the identical ecosystem.
Cybercriminals use a crypting service to obfuscate their malware, check it on AVCheck or related CAV providers to see whether it is undetectable, and solely then do they deploy it towards their targets.
Previous to the takedown of AVCheck, the police put up a pretend login web page that warned customers who tried to log in of the authorized dangers related to utilizing the service.
An announcement by the U.S. Division of Justice echos the statements of the significance of dismantling AVCheck and the encrypting providers, which they are saying occurred on Could 27, 2025.
“Cybercriminals do not simply create malware; they excellent it for optimum destruction,” mentioned FBI Particular Agent Douglas Williams.
“By leveraging counter antivirus providers, malicious actors refine their weapons towards the world’s hardest safety methods to raised slip previous firewalls, evade forensic evaluation, and wreak havoc throughout victims’ methods.”
Uncovering the unlawful nature of AVCheck and discovering hyperlinks to ransomware assaults focusing on American entities was made doable by the work of undercover brokers making purchases on these providers, posing as shoppers.
“In response to the affidavit filed in assist of those seizures, authorities made undercover purchases from seized web sites and analyzed the providers, confirming they have been designed for cybercrime, reads the Division of Justice announcement.
“Courtroom paperwork additionally allege authorities reviewed linked e mail addresses and different knowledge connecting the providers to recognized ransomware teams which have focused victims each in america and overseas, together with within the Houston space.” Â
This motion was a part of Operation Endgame, a large-scale worldwide legislation enforcement motion that just lately seized 300 servers and 650 domains used to facilitate ransomware assaults.
The identical operation beforehand disrupted the broadly fashionable (amongst cybercriminals) Danabot and Smokeloader malware operations