‘All servers’ for Redline and Meta infostealers hacked by Dutch police and FBI

Avatar

The Dutch National Police announced on Monday having gained “full access” to all of the servers used by the Redline and Meta infostealers, two of the most widely used cybercrime tools on the internet.

Infostealer malware is a major cybersecurity threat, often sold as a malware-as-a-service tool, that infects victims’ devices to harvest information such as credit card details and autofill password data.

Criminals using the malware then bundle the information into logs that are sold on credential marketplaces to fraudsters as well as other criminals attempting to infiltrate any organizations for which login details have been exposed.

On Monday, the Dutch National Police — alongside the FBI and other partner agencies in the United States, Australia and United Kingdom — announced disrupting these two infostealers on a website for “Operation Magnus,” which has a timer promising “more news” counting down to noon on Tuesday, Dutch local time.

A video on the site mimicking the criminals’ own advertisements says the police have provided a “final update” for both the Redline and Meta infostealer strains, explaining that the international operation “gained full access to all Redline and Meta servers.”

The video displays the extent of this access, showing off several administrator panels, the malware source code, and also listing what appears to be many dozens of usernames for individuals who use the malware-as-a-service tool.

“Involved parties will be notified, and legal actions are underway,” states the site, while the video adds, alongside a graphic of cuffed hands: “Thank you for installing this update. We’re looking forward to seeing you soon.”

MalwareNewsCybercrimeGovernmentNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Free, France’s second-largest telecoms company, confirms being hit by cyberattack

Next Post

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

Related Posts

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to secure privileged accounts. Why? Traditional Privileged Access Management (PAM) solutions often fall short, leaving: Blind spots that limit full visibility. Complex deployment processes.
Avatar
Read More

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions. That's according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the
Avatar
Read More

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)

This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even the smartest of us. On the other side, the good guys are busting secret online markets and kicking out shady chat rooms, while big companies rush to fix new security holes before attackers can jump in. Want to
Avatar
Read More