
This conclusion is not a huge leap as the malware author(s) offer both dedicated purchasing and support lines through their respective Telegram groups.”Įxperts speculate RedLine Stealer will continue to take advantage of the ongoing COVID pandemic and the stolen information will continue to fuel underground cybercrime marketplaces. It seems that the C2 server may be controlled by the Redline operators through an abused Telegram messaging service. This 149154.167.91 IP address is located in Great Britain and is part of the Telegram Messenger Network.
DOES OPERA GX STEAL DATA CODE
Over the course of the few weeks after this variant was released, we noticed one IP address in particular communicating with this C2 server.” states the report published by Fortinet. Do general computing Release Add non-game content height) A torrent link to a 125GB file with source code and business data of the video streaming. This variant uses 20732.217.89 as its C2 server through port 14588. The malware also looks for Telegram folders to locate images and conversation histories to steal, it also focuses on Tokens.txt which is used for Discord access.
DOES OPERA GX STEAL DATA SERIAL

The new variant discovered by Fortinet has the file name “Omicron Stats.exe,” threat actors are attempting to exploit the enormous interest on a global scale on the COVID-19 Omicron variant.Īccording to FortiGuard Labs, potential victims of this RedLine Stealer variant are located in at least 12 countries, a circumstance that suggests attackers did not target specific organizations or individuals.
DOES OPERA GX STEAL DATA ARCHIVE
Stolen data are stored in an archive (logs) before being uploaded to a server under the control of the attackers. The malicious code can also act as a first-stage malware. The RedLine malware allows operators to steal several information, including credentials, credit card data, cookies, autocomplete information stored in browsers, cryptocurrency wallets, credentials stored in VPN clients and FTP clients.
