Operation Magnus
On the 28th of October 2024 the
Dutch National Police, working in close cooperation with the FBI and other partners of the
international law enforcement task force Operation Magnus,
disrupted operation of the Redline and META infostealers.
Involved parties will be
notified, and legal actions are underway.
Latest news
International Press Release
A global operation, supported by Eurojust, has led to the takedown of servers of infostealers...
Read more
US joins international action
U.S. complaint charges developer and administrator; U.S. law enforcement seizes infrastructure...
Read more
ESET Online Scanner
Get a quick, reliable check for Redline and META with the ESET Online Scanner for Redline and META...
Read more
Get in touch
If you have more information or would like to get in touch, please reach out to us via Telegram at t.me/OperationMagnus
Information about Operation Magnus
In October 2024, Operation Magnus marked a landmark international cybersecurity effort to dismantle the RedLine and Meta malware networks. Spearheaded by the Dutch National Police, alongside the FBI, Eurojust, and numerous global law enforcement agencies, this operation seized over 1,200 servers and dismantled the malware infrastructure. The RedLine and Meta malware are "infostealers" that extract sensitive user information, including login credentials, cryptocurrency wallets, and browser histories. By obtaining this data, threat actors behind RedLine and Meta have compromised countless users, creating further risks like identity theft and cyber-espionage. The seized data now serves as evidence for prosecuting associated cybercriminals worldwide.
This coordinated action is part of a larger strategy to disrupt cybercrime infrastructure. Operation Magnus also captured essential elements of the malware networks, such as API servers, Telegram bots, and user data. International cooperation played a critical role in this achievement, with agencies across Europe, the United States, and Australia contributing to the effort. To stay updated on this and similar operations, explore resources on ITPro and BleepingComputer