Oh and someone within the #VirusTotal community flagged their latest Windows version as #RedLineStealer.

#RomVault appears to be a quite "interesting" piece of software...

#infosec #Myrient #Archiving

🚨 Collins Aerospace Breached Twice in One Week — Everest + Ransomware

Evidence confirms two distinct incidents:
– Everest data exfiltration (Sept 10–11): leveraged old credentials from a 2022 RedLine infection.
– Ransomware attack (Sept 19): separate event, caused system disruptions.

Legacy credentials remain one of the most exploited weaknesses in enterprise networks.

💬 How does your team track and rotate long-term credentials? Comment below & follow TechNadu for real-time cyber intelligence.

#CyberSecurity #CollinsAerospace #Everest #Ransomware #RedLineStealer #InfoSec #CredentialSecurity #ThreatIntel #AviationSecurity #CyberDefense #ZeroTrust #TechNadu

How this ClickFix campaign leads to Redline Stealer

An overwhelming share of the user credentials that are later abused in identity-based attacks arise from the compromise of unmanaged user devices. “Infosteal

Okta Security
ClickFix-Malware über TikTok: Infostealer im Influencer-Gewand

ClickFix-Malware über TikTok: Mit viralen TikTok-Videos als Trojanischem Pferd starten Cyberkriminelle neue Angriffswellen.

TARNKAPPE.INFO

Yo #HijackLoader to #RedLineStealer incidents all over the place today. Make sure you're blocking 92.255.85[.]36 at the fw and bitly[.]cx unless you need to use that specific url shortening service for some strange reason.

#infosec #threatintel #iocs

Des hackers russes piègent les amateurs d’avatars générés par intelligence artificielle

Un groupe de cybercriminels mise sur la tendance des avatars générés avec de l’intelligence artificielle pour piéger des internautes

[ White and Hack ]

Happy Monday everyone!

Kaspersky researchers discovered the #RedLineStealer being spread through a well-known HPDxLIB activator when adversaries published links directing unknown victims to malicious version of the software. The malicious software involved a malicious DLL getting loaded by "1cv8.exe" which would load another malicious library which would launch the stealer.

Looking at a report that was published earlier this year, McAfee researchers detailed some of the behaviors that are attributed to the RedLine Stealer. There was a creation of a "readme.txt" file in a C:\Program Files\ directory (most likely the directory of the malicious version of the legitimate software that was downloaded), there was a scheduled task created that referenced the "readme.txt", and a .cmd file that was created in the C:\Windows\Setup\Scripts\ directory that started a randomly named executable that once again, referenced the readme.txt file.

If I were hunting for this, I would start with scheduled tasks being created in my environment that may not match the naming convention established by my business. Enjoy the read and go get hunting! Happy Hunting!

RedLine info-stealer campaign targets Russian businesses through pirated corporate software
https://securityaffairs.com/171771/cyber-crime/redline-info-stealer-campaign-targets-russian-businesses.html

(You can find the original report in the link provided by this Security Affairs article.)

Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #huntoftheday #gethunting Cyborg Security, Now Part of Intel 471

RedLine info-stealer campaign targets Russian businesses

An ongoing RedLine information-stealing campaign is targeting Russian businesses using pirated corporate software.

Security Affairs
Operation Magnus: Info-Stealer RedLine und MetaStealer zerschlagen

Operation Magnus: Behörden zerschlagen Info-Stealer-Netzwerke. Erfolgreicher Schlag gegen RedLine und MetaStealer stoppt digitalen Datenklau.

TARNKAPPE.INFO
Malware News Cybercrime Government News Briefs Get more insights with the Recorded Future Intelligence Cloud. Learn more. 'All servers' for Redline and Meta infostealers hacked by Dutch police and FBI
#RedLineStealer #MetaStealer
https://www.reddit.com/r/isthisascam/comments/1gdck33/pls_help_i_do_have_a_big_package_otw/#lightbox
Understanding RedLine Stealer: The Trojan Targeting Your Data

In the ever-evolving landscape of cybersecurity threats, one name has increasingly become synonymous with stealth and precision: RedLine Stealer. This malicious software, often referred to as a Tro…

Malware Analysis