Operation Magnus


On the 28th of October 2024 the Dutch National Police, working in close cooperation with the FBI and other partners of the international law enforcement task force Operation Magnus, disrupted operation of the Redline and META infostealers.
Involved parties will be notified, and legal actions are underway.




Protect yourself

McAfee

McAfee Total Protection 2024

client logo client logo client logo client logo client logo client logo client logo client logo client logo client logo client logo client logo client logo

Latest news

art cover

International Press Release

A global operation, supported by Eurojust, has led to the takedown of servers of infostealers...


Read more
art cover

US joins international action

U.S. complaint charges developer and administrator; U.S. law enforcement seizes infrastructure...


Read more
art cover

Persbericht Politie (Dutch)

Internationale opsporingsdiensten ontmantelen infostealers...



Lees meer
art cover

ESET Online Scanner

Get a quick, reliable check for Redline and META with the ESET Online Scanner for Redline and META...


Read more

Get in touch

If you have more information or would like to get in touch, please reach out to us via Telegram at t.me/OperationMagnus

Information about Operation Magnus

In October 2024, Operation Magnus marked a landmark international cybersecurity effort to dismantle the RedLine and Meta malware networks. Spearheaded by the Dutch National Police, alongside the FBI, Eurojust, and numerous global law enforcement agencies, this operation seized over 1,200 servers and dismantled the malware infrastructure. The RedLine and Meta malware are "infostealers" that extract sensitive user information, including login credentials, cryptocurrency wallets, and browser histories. By obtaining this data, threat actors behind RedLine and Meta have compromised countless users, creating further risks like identity theft and cyber-espionage. The seized data now serves as evidence for prosecuting associated cybercriminals worldwide.

This coordinated action is part of a larger strategy to disrupt cybercrime infrastructure. Operation Magnus also captured essential elements of the malware networks, such as API servers, Telegram bots, and user data. International cooperation played a critical role in this achievement, with agencies across Europe, the United States, and Australia contributing to the effort. To stay updated on this and similar operations, explore resources on ITPro and BleepingComputer