Cyber-crime site selling hacking tool taken down following international operation

A website which sold a hacking tool purchased by cyber criminals in 124 countries and gave full remote control of victims’ computers has been taken down following an international investigation.

14,500 people across the world purchased the Imminent Monitor Remote Access Trojan (IM RAT) from for as little as US$25.

Once covertly installed on a victim’s computer, IM RAT allowed the hacker full access to the infected device, enabling them to disable anti-virus software, steal data or passwords, record key strokes and watch victims via their webcams.

The international operation was led by the Australian Federal Police (AFP) with the North West Regional Organised Crime Unit (NWROCU) leading the UK investigation with UK activity coordinated and supported by the National Crime Agency (NCA).

On Monday 25 November an international week of action commenced with enforcement activity taking place across nine countries targeting sellers and users of the tool.

21 search warrants were executed across the UK, in Greater Manchester, Merseyside, Milton Keynes, Hull, London, Leeds, Walsall, Lancashire, Nottingham, Surrey, Essex and Somerset.

All targeted suspected users of the RAT. Those warrants lead to nine arrests and the recovery of more than 100 exhibits.

Worldwide there were 85 warrants executed, 14 people arrested and more than 400 items seized.

In the South East on Tuesday (26/11) a combined team of South East Regional Organised Crime Unit Cyber Pursue and Surrey/Sussex Cyber officers executed a warrant in Ladbroke Road, Redhill under the following offences:

  • Section 1 of the Computer Misuse Act: unauthorised access to computer material
  • Section 3 of the Computer Misuse Act: Unauthorised access to a computer with intent to impair any computer or program
  • Section 3A of the Computer Misuse Act: Obtaining an article, intending it to be used to commit, or assist in the commission of an offence under section 1 or section 3

A 16-year-old boy was detained for questioning and later released under investigation. Three digital devices, a laptop, computer tower and mobile, were seized during the warrant.

Australian police effected a takedown of on the morning of Friday 29 November. Subsequently, the IM RAT tool can no longer be used by those that bought it.

Phil Larratt from the NCA’s National Cyber Crime Unit said:

“Working with the NWROCU, AFP and a range of international and European partners we were able to support the takedown of a website that was distributing malware and facilitating hacking offences”  

“The IM RAT was used by individuals and organised crime groups in the UK to commit a range of offences beyond just the Computer Misuse Act, including fraud, theft and voyeurism.

“Cyber criminals who bought this tool for as little as US$25 were able to commit serious criminality, remotely invading the privacy of unsuspecting victims and stealing sensitive data”.

“As part of Team Cyber UK, the NCA works with a wide range of law enforcement, government and private sector partners to affectively disrupt and deter this type of criminal activity.”

Chief Constable Andy Cooke, QPM, National Policing Lead for Serious and Organised Crime said:

“Cyber Crime is increasingly part of the serious and organised crime landscape and this example of international coordinated law enforcement activity shows the UK’s absolute commitment to tackling and undermining this constantly evolving threat.”

Detective Inspector Andy Milligan from the NWROCU said:

“This has been a complex, challenging cyber investigation with international scope. We have been supported throughout by the AFP, the NCA and our partners in Europol and Eurojust.  The UK’s Regional Organised Crime Unit (ROCU) network and Force Specialist Cyber Crime Units were pivotal during this phase of enforcement activity.

“The illicit use of IM RAT is akin to a cyber burglary, with criminals stealing data, including images and movies, secretly turning on web cams, monitoring key strokes and listening in to people’s conversations via computer microphones.

“Cyber Crime is not an anonymous victimless crime as some believe. There are real world consequences to people’s actions in cyber space and the international activity this week has shown how serious the UK treats this sort of criminality.

“People should protect themselves by following National Cyber Security Centre (NCSC) advice, ensuring operating systems are always up to date, that they use anti-virus and they don’t click on links or attachments in suspicious emails.

“NCSC guidance is available here

Notes to Editors

Full list of countries involved:

  1. United Kingdom
  2. Australia
  3. Belgium
  4. Sweden
  5. Czech Republic
  6. Poland
  7. Netherlands
  8. Spain
  9. Colombia

UK warrants executed:

  1. St Helens, Merseyside – North West Regional Organised Crime Unit (NWROCU)
  2. Liverpool, Merseyside – NWROCU
  3. Southwark, London – Metropolitan Police Service (MPS)
  4. Waltham Forest, London – MPS
  5. Frome, Somerset – South West Regional Organised Crime Unit (SWROCU)
  6. Leigh, Lancashire – NWROCU
  7. Oldham, Greater Manchester – NWROCU
  8. Hucknall, Nottingham – National Crime Agency
  9. Redhill, Surrey – South East Regional Organised Crime Unit (SEROCU)
  10.  Top Valley, Nottingham – East Midlands Special Operations Unit (EMSOU)
  11.  Manningtree, Essex – Eastern Region Special Operation Unit (ERSOU)
  12.  Hull – Yorkshire & Humberside Regional Organised Crime Unit (Y&H ROCU)/Humberside Police
  13.  Enfield, London – MPS
  14.  Greenford, London – MPS
  15.  Denton, Manchester – NWROCU
  16.  Halton, Leeds – Y&H ROCU/West Yorkshire Police
  17.  Walsall, West Midlands – West Midlands Regional Cyber Crime Unit
  18.  Bolton, Greater Manchester – NWROCU
  19.  Didsbury, Manchester – NWROCU
  20.  Milton Keynes – Thames Valley Police
  21.  Hull – Y&H ROCU/Humberside police