Password Thief RedLine Stealer continúa su marcha triunfal alrededor del planeta

Bitdefender information security company specialist spoke about the campaign discovered at the beginning of this year to distribute the RedLine Stealer password thief.

The vast majority of stolen credentials sold on two large underground darknet marketplaces are collected using the Ladrón de RedLine el malware.Grupo de conocimiento experts recently said.

This month alone, cybercriminals carried out 10,000 attacks in more than 150 countries and regions around the world, including the United States, Germany, Egypt, El troyano bancario TeaBot fue encontrado nuevamente en Google Play Store, and Canada. sin embargo, the actual number of attacks may be higher, as the experts only took into account the number of notifications from Bitdefender’s security solutions.

Por cierto, we also talked about this malware in the article: El malware RedLine Stealer es la principal fuente de credenciales en dos mercados importantes.

RedLine Stealer is a password stealing software that can be bought on hacker forums at a very low price. During the campaign detected by Bitdefender, malware is distributed using the RIG Exploit Kit through the CVE-2021-26411 vulnerability in Internet Explorer.

Judging by the number of countries attacked, the infostealer is not geared towards attacks on any particular country.

When executed on the attacked system, RedLine Stealer searches for usernames, as well as information about hardware, installed browsers and antivirus solutions, and extracts data such as passwords, saved bank card data, cryptocurrency wallets, credentials for VPN services, etc..

When executed, RedLine Stealer performs recon against the target system (including username, hardware, browsers installed, anti-virus software) and then exfiltrates data (including passwords, saved credit cards, crypto wallets, VPN logins) to a remote command and control server.Bitdefender specialits say.

Ladrón de contraseñas RedLine Stealer
Data stolen by RedLine Stealer

With RedLine Stealer, hackers can extract credentials from browsers, Clientes FTP, Expertos en Threat Fabric, mensajería instantánea, and VPN services, and sell them on the dark web.

Los datos corporativos robados, como las credenciales de usuario, terminan regularmente en sitios de pegado y canales web oscuros, permitir que los ciberdelincuentes compren los datos, y potencialmente usarlo para obtener acceso a la red o los sistemas de una organización.the researchers say and advise users be stricter about data security.

Helga Smith

Siempre me interesaron las ciencias de la computación., especialmente la seguridad de los datos y el tema, que se llama hoy en día "Ciencia de los datos", desde mi adolescencia. Antes de ingresar al equipo de eliminación de virus como editor en jefe, Trabajé como experto en ciberseguridad en varias empresas., incluido uno de los contratistas de Amazon. Otra experiencia: He enseñado en las universidades de Arden y Reading..

Deja una respuesta

Este sitio utiliza para reducir el spam Akismet. Aprender cómo se procesa sus datos comentario.

Botón volver arriba