Special Features

Cybersecurity Month

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow


Dutch police (Politie) say they've dismantled the servers powering the Redline and Meta infostealers – two key tools in a modern cyber crook's arsenal.

The Politie announced the news of Operation Magnus' success on Monday in what appears to be a continuation of law enforcement's cyber-bust template: Mocking those involved and slowly releasing details of the operation over the course of multiple days. The same approach was taken with LockBit and Operation Endgame earlier this year.

"This is the final update for Redline and Meta" were the words used to open the operation's announcement, which was styled as a marketing video teasing new features for the infamous infostealers.

The Politie worked with a number of international law enforcement agencies to disrupt Redline and Meta's infrastructure, it said.

"We gained full access to all Redline and Meta servers. Did you know they were actually pretty much the same?" the video went on to say.

Among the data law enforcement officials gained access to were usernames, passwords, IP addresses, timestamps, registration dates, "and much more."

Investigators say they also acquired all source code for both infostealers, including the license and REST API servers, user panels, and Telegram bots.

The video also confirmed a stream of usernames, suggesting that investigators now have a list of individuals who had paid for and likely deployed the malware at least once.

Operation Cronos, the taskforce that disrupted LockBit in February, released a similar list after gaining access to the ransomware group's backend, exposing the aliases of all known affiliates.

"VIP status for all Redline and Meta users, where VIP means 'very important to the police.' Thank you for installing this update. We are looking forward to seeing you soon," the video ends, depicting hands in handcuffs.

The Register asked the Politie if any arrests had yet been made and for additional details about the case, but it didn't immediately respond. 

However, the website dedicated to Operation Magnus indicates that if arrests haven't yet been made, they may soon be. 

"Involved parties will be notified, and legal actions are underway," the site reads.

The next update on the operation's efforts is scheduled for Tuesday morning, per a countdown on its website.

Key cogs removed

Information-stealing malware strains such as Redline and Meta are crucial tools for cybercriminals in the early stages of attacks.

Often spread through phishing emails and compromised websites, these stealers are built to scan a victim's machine for secrets and credentials stored in the likes of browsers, emails, messaging apps, and other software that can eventually be used for more significant attacks.

Credentials are either used by the individual(s) behind the infostealer for their own nefarious activities, or sold on to others who use them to compromise organizations, often leading to ransomware or other lucrative attacks.

Redline has been around for some time, with researchers first spotting it in 2020. It's described as an affordable malware-as-a-service (MaaS) with prices starting at just $150 per user, rising to $800 for the fully featured "pro" version.

Illustrating how trusted and popular the Redline stealer was, the serial extortionists that comprise Scattered Spider are known customers of the malware while other major crews are also keen on using infostealers more generally.

Meta is a comparably newer malware, first seen in 2022 and most often spreads via phishing emails.

Security shop Acronis said it was being sold for $125 or $1,000 for the lifetime-access version, offering capabilities similar to Redline.

"This malware is currently distributed through a widespread email campaign, luring victims with a purported offer of a 'refund' via money transfer," said Acronis around the time of its launch. "A seemingly innocuous DocuSign file attachment actually contains malicious macros that deliver the infostealer."

SentinelOne also noted that at the start of the year, Meta was targeting macOS users specifically. According to its data, customers of the MaaS were posing as prospective clients of businesses using Macs to social engineer them into installing the Meta stealer.

The number of infostealers on the market means the disruption of Redline and Meta is unlikely to yield much in the way of material impact on the cybercrime landscape. 

Similar to the ransomware ecosystem, there are always replacements ready and waiting to pick up business when others fall. 

However, if officials are able to arrest key members of the teams behind the Redline and Meta stealers, Operation Magnus will be seen as a net win for law enforcement. ®

Send us news
5 Comments

Pixel perfect Ghostpulse malware loader hides inside PNG image files

Miscreants combine it with an equally tricky piece of social engineering

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine

LottieFiles supply chain attack exposes users to malicious crypto wallet drainer

A scary few Halloween hours for team behind hugely popular web plugin

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

Healthcare Services Group discloses 'cybersecurity incident' in SEC filing

Laundry and dining provider still investigating cause and scope

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency

ESET denies it was compromised as Israeli orgs targeted with 'ESET-branded' wipers

Says 'limited' incident isolated to 'partner company'