{"id":27991,"date":"2024-10-29T18:18:45","date_gmt":"2024-10-29T18:18:45","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=27991"},"modified":"2024-10-29T18:18:45","modified_gmt":"2024-10-29T18:18:45","slug":"operation-magnus-redline-meta-infostealer","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/operation-magnus-redline-meta-infostealer\/","title":{"rendered":"Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers"},"content":{"rendered":"<p>On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following Operation Magnus. <strong>Law enforcement managed to take over and disable the vast majority of infrastructure<\/strong> belonging to two infostealer programs \u2013 RedLine and META. The main part of the operation took part in the Netherlands and Belgium.<\/p>\n<h2>RedLine and META infostealer malware disrupted in Operation Magnus<\/h2>\n<p>Under the course of Operation Magnus, law enforcement agencies of 6 countries \u2013 <strong>US, Australia, Germany, UK, Belgium and Portugal<\/strong>, managed to take down Web infrastructure of infostealer viruses and arrest two individuals involved in malware operations. The information, along with a lot of details, comes from the <a href=\"https:\/\/www.operation-magnus.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">official website of the operation<\/a>, established swiftly after its finish.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/operation-magnus-site.png\" alt=\"Operation Magnus website\" width=\"912\" height=\"765\" class=\"aligncenter size-full wp-image-27992\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/operation-magnus-site.png 912w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/operation-magnus-site-300x252.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/operation-magnus-site-768x644.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/operation-magnus-site-860x721.png 860w\" sizes=\"auto, (max-width: 912px) 100vw, 912px\" \/><\/p>\n<p>The website features an interesting video, with the recordings of what they\u2019ve managed to capture during the operation. Among other things are source codes of the malware, all access credentials for <a href=\"https:\/\/gridinsoft.com\/command-and-control\">C2 panels<\/a>, Telegram bot, and all the server infrastructure required to handle the malware users.<\/p>\n<p>According to this exact video, law enforcement agencies apparently get their hands into the infrastructure much before disrupting the operations, and slipped in a forged update. This update, in turn, <strong>leaked all the important information of malware users<\/strong> (i.e. ones who bought the subscription and used it to spy on people). Such data will be quite handy for cyber police to find and detain the attackers.<\/p>\n<p>And that is exactly what the promise to do, at least according to the video. It ends with the lines \u201cThank you for installing this update. We are looking forward to seeing you soon!\u201d, with an icon of cuffed hands in the middle.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta.png\" alt=\"Video Redline META\" width=\"1747\" height=\"977\" class=\"aligncenter size-full wp-image-27993\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta.png 1747w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta-300x168.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta-1024x573.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta-768x429.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta-1536x859.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/hands-cuffed-redline-meta-860x481.png 860w\" sizes=\"auto, (max-width: 1747px) 100vw, 1747px\" \/><\/p>\n<p>This operation in its core principles aligns with the tactic that law enforcement all around the planet opted for in their effort against cybercrime. Instead of chasing headmasters of malware operations, <strong>they disrupt infrastructure, collect all the available data<\/strong> and detain all the malware operators who come by. This tactic allowed disrupting operations, though temporarily, of even the toughest malware groups like <a href=\"https:\/\/gridinsoft.com\/blogs\/qakbot-hacked-removed-from-700k-machines\/\">QakBot<\/a> and <a href=\"https:\/\/gridinsoft.com\/blogs\/lockbit-ransomware-taken-down\/\">LockBit<\/a>.<\/p>\n<h2>Two Hackers Arrested, 1200 Servers Taken Down<\/h2>\n<p>The overall network infrastructure of two malware families consisted of over 1200 servers, located in multiple countries around the world. Getting access to all of them was actually the reason for involving such a significant number of law enforcement agencies from different countries.<\/p>\n<p><strong>Key initiator of the campaign is Eurojust<\/strong>, <a href=\"https:\/\/www.eurojust.europa.eu\/news\/malware-targeting-millions-people-taken-down-international-coalition\" target=\"_blank\" rel=\"nofollow noopener\">who coordinated the effort<\/a> in different parts of the world. Aside from disabling that huge amount of virtual servers, Netherland\u2019s National Police managed to get 2 physical servers \u2013 a much more valuable asset in terms of pushing the investigation further.<\/p>\n<p>In Belgium, Federal Police arrested two people accused of managing the network infrastructure. Their personalities as well as actual roles in malware operations are to be disclosed, but I guess they are far from being top management of the malware gang. It is well known that RedLine originated from Russia, and it is highly likely for META infostealer to be a similar story.<\/p>\n<p>What are these infostealers?<\/p>\n<p><strong>RedLine and META viruses are both infostealers<\/strong> that target at collecting as much user information as possible. Online account credentials, session tokens, cookies, crypto wallet information \u2013 they pick everything they can reach to on the attacked machine, and then stay in to eavesdrop on possible other info.<\/p>\n<p>Both malware samples are pretty widespread, with <a href=\"https:\/\/gridinsoft.com\/spyware\/redline\">RedLine<\/a> reaching over 50 infections daily. Though, this is far from its prime-time: back in the days, new infections appeared in hundreds per day. META lastly had higher volumes of infection recently, though due to its shorter activity span, there is not too much to say about its past.<\/p>\n<div class=\"su-image-carousel  su-image-carousel-has-spacing su-image-carousel-has-outline su-image-carousel-adaptive su-image-carousel-slides-style-default su-image-carousel-controls-style-dark su-image-carousel-align-center\" style=\"\" data-flickity-options='{\"groupCells\":true,\"cellSelector\":\".su-image-carousel-item\",\"adaptiveHeight\":true,\"cellAlign\":\"left\",\"prevNextButtons\":true,\"pageDots\":true,\"autoPlay\":5000,\"imagesLoaded\":true,\"contain\":false,\"selectedAttraction\":0.007,\"friction\":0.25}' id=\"su_image_carousel_696cfb86a05f4\"><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"598\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/redline-stat.webp\" class=\"\" alt=\"Meta activity stats\" title=\"\"><span>Activity graph of META stealer<\/span><\/div><\/div><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"599\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/meta-stats.webp\" class=\"\" alt=\"Redline activity stats\" title=\"\"><span>Activity graph of RedLine stealer<\/span><\/div><\/div><\/div><script id=\"su_image_carousel_696cfb86a05f4_script\">if(window.SUImageCarousel){setTimeout(function() {window.SUImageCarousel.initGallery(document.getElementById(\"su_image_carousel_696cfb86a05f4\"))}, 0);}var su_image_carousel_696cfb86a05f4_script=document.getElementById(\"su_image_carousel_696cfb86a05f4_script\");if(su_image_carousel_696cfb86a05f4_script){su_image_carousel_696cfb86a05f4_script.parentNode.removeChild(su_image_carousel_696cfb86a05f4_script);}<\/script>\n<p>As Operation Magnus turned out, <strong>the viruses are pretty much the same in terms of codebase<\/strong>, exactly, META repeated the older RedLine infostealer. Such rebranding is a common practice among different malware families, especially when one of the developers leaves the project and decides to start over under a different name. Though, no such things were happening around RedLine recently, so there\u2019s no clear understanding why this happened.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following Operation Magnus. Law enforcement managed to take over and disable the vast majority of infrastructure belonging to two infostealer programs \u2013 RedLine and META. The main part of the operation took part in the Netherlands [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":27997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,28,483,48],"class_list":{"0":"post-27991","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-malware","10":"tag-redline","11":"tag-spyware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/10\/operation-magnus-redline-meta-disrupted.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=27991"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27991\/revisions"}],"predecessor-version":[{"id":27996,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/27991\/revisions\/27996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/27997"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=27991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=27991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=27991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}