The US introduced costs at present in opposition to Maxim Rudometov, a Russian nationwide, for being the suspected developer and administrator of the RedLine malware operation, one of the vital prolific infostealers over the previous few years.
These infostealers, marketed to cybercriminals and offered by way of subscriptions, allow attackers to steal credentials and monetary knowledge and bypass multi-factor authentication.
Rudometov was named in an replace to ‘Operation Magnus,’ a global legislation enforcement operation that introduced yesterday it had disrupted the RedLine and META malware-as-a-service (MaaS) platforms.
The operation was spearheaded by the Dutch police working with worldwide companions, together with the FBI, U.S. Division of Justice, and Eurojust, reaching unprecedented disruption to 2 extremely impactful MaaS operations which have stolen tens of millions of account credentials.
The U.S. DOJ introduced at present costs in opposition to Maxim Rudometov based mostly on proof of his direct involvement with the creation of RedLine and the administration of its operations.
“Rudometov recurrently accessed and managed the infrastructure of RedLine Infostealer, was related to varied cryptocurrency accounts used to obtain and launder funds, and was in possession of RedLine malware,” reads the announcement from the DOJ.
Rudometov faces the next costs for his involvement and main position within the RedLine infostealer operation.
- Entry System Fraud below 18 U.S.C. § 1029, with a most penalty of 10 years in jail.
- Conspiracy to Commit Laptop Intrusion below 18 U.S.C. §§ 1030 and 371, with a most penalty of 5 years in jail.
- Cash Laundering below 18 U.S.C. § 1956, with a most penalty of 20 years in jail.
If convicted on all counts, he may withstand 35 years in jail. Nevertheless, it’s unclear if the risk actor has been arrested at this level.
The U.S. DOJ famous that the investigation remains to be underway and doesn’t consider it possesses all of the proof within the type of knowledge stolen by the malware.
Extra data was additionally launched by Eurojust and the Dutch police at present, revealing that the authorities took down three servers within the Netherlands and seized two domains used for command and management operations by RedLine and META.
Two individuals had been additionally arrested in Belgium, with one already being launched and the opposite stated to be a buyer of the malware operations.
The authorities had been led to the core a part of the infrastructure after receiving ideas from ESET, mapping an in depth community of over 1,200 servers positioned in a number of nations, which communicated with the central servers within the Netherlands.
Telegram accounts utilized by RedLine and META to advertise the malware to patrons have additionally been seized, so the gross sales channels have been disrupted too.
Sadly, if Rudometov remains to be at giant there’s nothing stopping the risk actor from rebuilding the malware infrastructure and relaunching operations.
ESET launches on-line scanner
Cybersecurity agency ESET, which participated within the crackdown operation as a technical advisor, launched a web based scanner to assist potential victims decide if they’re contaminated by info-stealer malware.

Supply: BleepingComputer
Downloading the scanner opens step-by-step directions on the best way to use it, whereas it is also attainable to set it to carry out periodic scans for steady safety.
ESET means that those that get constructive scan outcomes, that means they’re contaminated, ought to change their on-line account passwords and monitor their monetary account exercise carefully.