1200 Servers Of RedLine & META Infostealers Seized By Authorities
Dutch police, working with companions from around the globe, have made an necessary achievement by shutting down two well-known teams liable for stealing info. These teams are referred to as RedLine and MetaStealer. It is a massive step in preventing cybercrime.
The operation, codenamed “Operation Magnus,” befell on October 28, 2024, and concerned authorities from america, the UK, Belgium, Portugal, and Australia.
The takedown resulted within the shutdown of three servers within the Netherlands and the confiscation of two domains. Authorities estimate that over 1,200 servers throughout dozens of nations have been concerned in working the malware.
The operation led to the arrest of two people in Belgium, one in all whom stays in custody. U.S. authorities have filed expenses in opposition to an administrator.
Methods to Defend Web sites & APIs from Malware Assault -> Free Webinar
RedLine and MetaStealer are information-stealing malware that concentrate on delicate knowledge corresponding to passwords, login credentials, and personally identifiable info.
These instruments have been essential within the cybercrime ecosystem, permitting risk actors to reap precious knowledge for additional assaults or sale on prison marketplaces.
The Dutch Nationwide Police gained full entry to the criminals’ back-end infrastructure, together with supply code, license servers, API servers, panels, and Telegram bots.
This entry has offered regulation enforcement with precious details about the malware’s customers, together with usernames, passwords, IP addresses, and registration dates.
Safety researchers estimate that RedLine alone was liable for stealing over 170 million passwords in simply the final six months. The malware has been energetic since no less than 2020 and was typically distributed via phishing emails or malicious downloads.
The success of Operation Magnus demonstrates the ability of worldwide cooperation in combating cybercrime.
ESET has created a new tool that helps you identify whether or not your private info has been stolen and offers recommendation on what to do if it has been.
As investigations proceed, authorities are anticipated to take additional authorized actions in opposition to people concerned in utilizing and distributing these malware strains.
This operation serves as a stark warning to cybercriminals that regulation enforcement companies have gotten more and more efficient at disrupting their actions, even in areas the place they beforehand felt untouchable.
Run personal, Actual-time Malware Evaluation in each Home windows & Linux VMs. Get a 14-day free trial with ANY.RUN!