Loading stock data...
cyber security data sharing

A coalition of international law enforcement agencies has announced the disruption of two prolific infostealer malware operations, Redline and Meta. The Dutch National Police, who led the operation dubbed "Operation Magnus," reports gaining full access to the servers used by these malicious programs.

What are Infostealers?

Infostealers are a type of malware specifically designed to extract sensitive information from an infected system. This includes passwords, credit card data, search histories, and the contents of cryptocurrency wallets. These malicious programs have been used by criminals to steal the sensitive data of hundreds of millions of people.

Redline: A Prolific Strain of Infostealer Malware

Redline is considered one of the most prolific strains of infostealer malware. It has been active since 2020 and has been attributed to several high-profile hacks, including a 2022 breach at Uber and the theft of login details from Worldcoin Orb operators.

Meta: A Relatively New Infostealer

Meta is a relatively new infostealer that has gained notoriety in recent months. According to Operation Magnus, the agencies were able to access the usernames, passwords, IP addresses, timestamps, and registration dates, along with the source code for both Redline and Meta infostealers.

Operation Magnus: A Joint Effort

Operation Magnus was a joint effort between the Dutch National Police, the U.S. Federal Bureau of Investigation (FBI), and the UK’s National Crime Agency. The operation involved taking control of the servers used by Redline and Meta to gain full access to their operations.

Accessing Malware Operations

The agencies report that they were able to access the following information from the Redline and Meta servers:

  • Usernames, passwords, IP addresses, timestamps, and registration dates: The agencies gained access to this sensitive information, which could potentially lead to identifying individuals involved in the operations.
  • Source code for both infostealers: By accessing the source code, the agencies can gain a deeper understanding of how these malware programs work and identify potential vulnerabilities.
  • Telegram bots used by operators: The agencies were able to access the Telegram bots used by the operators of Redline and Meta, which could lead to identifying key individuals involved in the operations.

VIP Users: A Teaser from the Agencies

The agencies also teased a list of usernames belonging to ‘VIP’ users of the Redline and Meta infostealers. It’s not yet clear if any arrests have been made as part of the operation, but the website claims that "legal actions are underway."

A Similar Approach: LockBit Operation

Operation Magnus took a similar approach to the recent takedown of the ransomware gang LockBit. In that operation, police took control of the dark web leak site used by LockBit to post details of the operation.

International Cooperation: A Key Factor in Disrupting Infostealers

The success of Operation Magnus highlights the importance of international cooperation in disrupting infostealer malware operations. By working together, law enforcement agencies can share knowledge and resources to effectively take down these malicious programs.

A Look at the Agencies Involved

  • Dutch National Police: Led the operation and gained full access to the servers used by Redline and Meta.
  • U.S. Federal Bureau of Investigation (FBI): Participated in the joint effort and contributed to the disruption of the operations.
  • UK’s National Crime Agency: Collaborated with the Dutch National Police and FBI to take down the infostealer malware.

Conclusion

The disruption of Redline and Meta infostealer malware operations is a significant victory for international law enforcement agencies. The operation highlights the importance of cooperation and shared knowledge in disrupting malicious programs. As technology continues to evolve, it’s essential that law enforcement agencies remain vigilant and work together to protect individuals from cyber threats.

Related Articles

  • Apple May Add an iPhone Air to Its Lineup: Apple is reportedly considering adding a new model to its iPhone lineup.
  • How to Turn Off Apple Intelligence-Powered Notification Summaries: Learn how to disable Apple’s notification summaries on your iPhone or iPad.
  • Open Source Licenses: Everything You Need to Know: Understand the basics of open-source licenses and their implications for developers.

About the Author

Carly Page is a Senior Reporter at TechCrunch, where she covers the cybersecurity beat. She has spent more than a decade in the technology industry, writing for titles including Forbes, TechRadar, and WIRED. You can contact Carly securely on Signal at +441536 853956 or via email at carly.page@techcrunch.com.

Subscribe to Our Newsletter

Stay up-to-date with the latest news and trends in the world of technology by subscribing to our newsletter.