Researchers at Bitdefender have discovered a new campaign of cybercriminals using the RIG exploit kit to distribute the famous RedLine malware, which aims to steal victims’ data and transfer it to operators.
Interestingly, exploit kits like RIG, which used to be quite popular, are now increasingly fading into the shadows. And all thanks to improved browser protection mechanisms and the rejection of “leaky” technologies like Flash Player and Microsoft Silverlight.
However, attackers using exploit kits can still break through individual users who are used to not updating their browser. For example, in the campaign described by Bitdefender, RIG delivers an info-stealer by exploiting a bug in Internet Explorer.
We are talking about a vulnerability under the identifier CVE-2021-26411, which leads to memory corruption when viewing a specially crafted website. If a user is lured to such a resource, the RedLine malware will be installed on their system.
MANW Virus Ransomware (.manw File) – How To Remove?
MANW virus belongs to one of the most widespread ransomware-type malware families – STOP/Djvu. It gets into your computer, encrypts your files (to MANW file), and adds a ransom note…
Ransomware sell decryptor in Roblox Game Pass store
The MalwareHunterTeam has discovered a new ransomware sample built with the Chaos builder. The malware, called WannaFriendMe, is remarkable in that it offers to buy a Roblox game pass for…
Having dug into the system, RedLine collects and sends confidential information to operators: keys from crypto wallets, bank card data, logins, and passwords saved in browsers.
Decompressing RedLine is a six-step process consisting of decompression, key extraction, assembly, etc. As a result, files in the DLL format can successfully avoid detection by antivirus tools. The malware connects to the command and control server at 220.127.116.11 on port 15386. Data collected from VPN and FTP clients, Discord, Telegram, Steam, and crypto-wallets are also sent there.