‘All servers’ for Redline and Meta infostealers hacked by Dutch police and FBI

Avatar

The Dutch National Police announced on Monday having gained “full access” to all of the servers used by the Redline and Meta infostealers, two of the most widely used cybercrime tools on the internet.

Infostealer malware is a major cybersecurity threat, often sold as a malware-as-a-service tool, that infects victims’ devices to harvest information such as credit card details and autofill password data.

Criminals using the malware then bundle the information into logs that are sold on credential marketplaces to fraudsters as well as other criminals attempting to infiltrate any organizations for which login details have been exposed.

On Monday, the Dutch National Police — alongside the FBI and other partner agencies in the United States, Australia and United Kingdom — announced disrupting these two infostealers on a website for “Operation Magnus,” which has a timer promising “more news” counting down to noon on Tuesday, Dutch local time.

A video on the site mimicking the criminals’ own advertisements says the police have provided a “final update” for both the Redline and Meta infostealer strains, explaining that the international operation “gained full access to all Redline and Meta servers.”

The video displays the extent of this access, showing off several administrator panels, the malware source code, and also listing what appears to be many dozens of usernames for individuals who use the malware-as-a-service tool.

“Involved parties will be notified, and legal actions are underway,” states the site, while the video adds, alongside a graphic of cuffed hands: “Thank you for installing this update. We’re looking forward to seeing you soon.”

MalwareNewsCybercrimeGovernmentNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Free, France’s second-largest telecoms company, confirms being hit by cyberattack

Next Post

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

Related Posts

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27)

Cybersecurity news can sometimes feel like a never-ending horror movie, can't it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, international espionage, and AI shenanigans that could make your head spin. But don't worry, we're here to break it all down in plain English and arm you with the
Avatar
Read More

17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London

British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). "The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September," the U.K. National Crime Agency (NCA) said. The teenager, who's from Walsall, is said to have been
Avatar
Read More

North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks

The North Korea-aligned threat actor known as Kimsuky has been linked to a series of phishing attacks that involve sending email messages that originate from Russian sender addresses to ultimately conduct credential theft. "Phishing emails were sent mainly through email services in Japan and Korea until early September," South Korean cybersecurity company Genians said. "Then, from mid-September,
Avatar
Read More