UPDATE (November 12 th, 2024): We clarified the information in the fourth paragraph to better reflect RedLine's functionality before versus after the takedown. Back in April 2023, ESET participated in ...
Do you let your browser store logins for websites like Twitter, Facebook, or HotHardware? Well, you probably shouldn't. Not only does it let anyone who gets on your PC access your personal information ...
A new version of the ScrubCrypt obfuscation tool is being used to target organizations with the RedLine Stealer malware, fraud sensor network Human Security has warned. Human’s Satori Threat ...
Threat actors have conducted a campaign relying on the RedLine stealer and targeting YouTube users. The news comes from cybersecurity researchers at Kaspersky, who published an advisory about the ...
A mass phishing campaign is targeting Windows PCs and aims to deliver malware that can steal usernames, passwords, credit card details and the contents of cryptocurrency wallets. The malware first ...
The FBI in collaboration with various international law-enforcement agencies has seized the servers and source code for the RedLine and Meta stealers as part of Operation Magnus, and US authorities ...
Read more about a joint operation between several law enforcement agencies across the globe to tackle RedLine Stealer and META malware. Explore Get the web's best business technology news, tutorials, ...
AgentTesla, LimeRAT, W3Cryptolocker and Redline Stealer are now using Paste.nrecom in spear-phishing attacks. Cybercriminals are increasingly turning to a legitimate, Pastebin-like web service for ...
Fortinet has uncovered an effort to spread RedLine malware through news about the COVID-19 Omicron strain. FortiGuard Labs researchers said the people behind the malware are trying to use the ongoing ...
A new variant of the RedLine info-stealer is distributed via emails using a fake COVID-19 Omicron stat counter app as a lure. RedLine is a widespread commodity malware sold to cyber-criminals for a ...
Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks Your email has been sent Read more about a joint operation between several law enforcement agencies across the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results