The RedLine malware attacks browsers based on the Chromium engine — Chrome, Edge, Yandex.Browser and Opera, as well as on the basis of the Gecko engine - Mozilla Firefox and Netscape. RedLine steals saved passwords, bank card data, information about cryptocurrency wallets, cookies, system information, and other information from browsers.
Further, experiments showed that the program collects any sensitive information stored in browsers, and in addition allows you to control the computers of victims via the SOAP remote access protocol and hypothetically create botnets from them. The problem affects not only companies but also ordinary users.
The RedLine program appeared on the Russian darknet in February 2020. The announcement of its sale was posted by a Russian-speaking user with the nickname REDGlade.
The AhnLab ASEC report calls RedLine a serious cyber threat. ASEC discovered the program in 2021 when they were investigating the hacking of the network of an unnamed company. It turned out that access was carried out through a VPN service from an employee's computer infected with RedLine.
Attackers sell malware on the darknet and telegram for an average of $150-200. RedLine is distributed using phishing mailings with attached files in the format .doc, .xls, .rar, .exe. It is also uploaded to domains that disguise themselves as an online casino or, for example, the website of the Krupskaya Confectionery Factory.
It is worth noting that in December 2021, RedLine became the most popular program used in cyber attacks. Since the beginning of the month, more than 22 thousand attacks have been carried out with the help of RedLine.
Experts urged not to store credentials in browsers, suggesting instead to use a password manager and enable two-factor authentication wherever possible.
Up to 15 Russian financial organizations were subjected to a large-scale cyberattack in August and September of this year.
The first deputy head of the Information Security Department of the Bank of Russia, Artem Sychev, said that 10-15 Russian financial organizations that serve e-commerce were subjected to cyber attacks in August and early September.
According to him, it was several DDoS attacks. “Most of these attacks were repelled in an automated mode by the means that financial organizations have,” Sychev noted.
Financial CERT (Financial Sector Computer Emergency Response Team, a special division of the Bank of Russia) also helped to cope with the attacks, which quickly notified banks about the attacks and connected telecom operators to solving problems. They helped to quickly redirect traffic and enable tools that filter malicious traffic.
According to Sychev, the attacks were serious, but the attackers failed to disrupt the performance of credit institutions.
“But, nevertheless, there is such a risk of dependence on monopoly service providers for financial organizations,” he added.
“The events that took place in Russia in August and early September and were associated with massive DDoS attacks clearly showed that it is not enough for us, as the financial industry, to exchange information with each other, we need to do this with telecom operators, as they are the basis for interaction between customers and financial organizations. How quickly we can interact between financial organizations and telecom operators largely depends on how quickly we can respond to the attacks that occur in the financial sector, and how quickly we can cope with these attacks,” Sychev added.
On September 2, Deputy Chairman of the Board of Sberbank Stanislav Kuznetsov said that the bank had successfully repelled the world's most powerful DDoS attack on the financial sector.