RedLine Stealer malware is the main source of credentials in two major marketplaces
According to Insikt Group analysts, the vast majority of stolen credentials sold on two large underground darknet marketplaces are collected using the RedLine Stealer malware.
RedLine Stealer was first discovered in March 2020. The malware is capable of extracting credentials from browsers, FTP clients, emails, instant messengers, and VPNs. In addition, the malware can steal authentication cookies and card numbers stored in browsers, chat logs, local files and databases of cryptocurrency wallets.
Initially, this malware was sold on hack forums called REDGlade, but after the tool received positive reviews, pirated versions of RedLine Steale began to appear on the same forums.
As a result, by August of this year, this allowed malware to spread widely among cybercriminals, and they did not even have to pay to use the malware. At the same time, the researchers note that the paid version of RedLine Steale also found its customers.
The Insikt Group experts’ conclusions echo a similar KELA report dated February 2020. Then the researchers found that about 90% of the stolen credentials on the Genesis Market were obtained as a result of attacks by the AZORult info-stealer.
These findings suggest that underground marketplaces are highly fragmented and usually work with their own specific vendors. Likewise, legitimate marketplaces have their own preferences in choosing business partners.
Let me remind you that we also wrote that BluStealer malware steals cryptocurrency and spreads through phishing emails.