www.scmagazine.com Open in urlscan Pro
2606:4700:20::ac43:45e3  Public Scan

URL: https://www.scmagazine.com/news/redline-malware-top-credential-stealer-of-last-6-months?freeoffer=moneymakers
Submission: On August 11 via api from LU — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="fs-9 my-4">
    <p>By clicking the Subscribe button below, you agree to SC Media <a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use">Terms and Conditions</a><span> and
      </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy">Privacy Policy</a>.</p>
  </div>
  <div class="row"><button type="submit" class="col-6 btn btn-primary">Subscribe</button></div>
</form>

Text Content

Log inRegister
CISO Stories
Topics
Events
Podcasts
Research
Recognition
Leadership
About
Open Search Bar

ADVERTISEMENT




Identity, Network Security, Malware


REDLINE MALWARE TOP CREDENTIAL STEALER OF LAST 6 MONTHS

March 14, 2024
Share

By Stephen Weigand
(Adobe Stock)

RedLine malware was used to steal more than 170 million passwords over the last
six months, which makes it the most notorious credential stealer during that
time, according to research published March 12.

RedLine was used in half of all cyber incidents involving stolen passwords (47%)
and led the next closest stealer (Vidar) by over two-fold. Vidar, according to
the report, was used to pilfer more than 65 million passwords, or 17%. Coming in
at the No. 3 is the malware Raccoon Stealer tied to over 42 million stolen
passwords, or 11.7%. Malware strains Meta, Cryptbot, Risepro, Stealc, Azorult,
Aurora and Darkcrystal rounded out the top 10 credential stealers. 

The data was culled from known breached passwords lists by KrakenLabs and
password management firm Specops, both owned by parent company Outpost24. 

(Specops)

ADVERTISEMENT



Over the last six months, KrakenLabs analyzed 359 million stolen passwords to
find out the most common malware used to steal credentials, while Specops said
their database of breached and compromised passwords contains more than 4
billion unique passwords.

Uncovered in March 2020, the RedLine malware is used to export personal
information such as credentials, cryptocurrency wallets and financial data to
its command-and-control infrastructure. Its payload can also deliver
cryptocurrency miner software on the victim’s machine. Specops reported that
phishing campaigns were most often used to distribute the leading stealer
malware, as well as compromised Google or YouTube accounts.

Vidar is an evolved version of the Arkei Stealer, according to Specops, and is
distributed in phishing campaigns as Microsoft Compiled HTML Help (CHM) files.
Vidar has also been distributed by the PPI malware service PrivateLoader, the
Fallout Exploit Kit and the Colibri loader, as well as the GHOSTPULSE malware
loader.

Raccoon Stealer is a malware-as-a-service that allows cybercriminals to rent the
stealer on a monthly basis.

As noted by Specops, stolen credentials can be used to carry out further
attacks, but more often they're sold on the dark web for other attackers to use
the credentials to gain access to networks. 

The FBI reported that its Internet Crime Complaint Center received a record
880,418 complaints in 2023, an increase of nearly 10% from the year before, and
includes crimes such as investment fraud and business email compromise scams, as
well as ransomware and cryptocurrency scams.

Similarly, the Identity Theft Resource Center reported in January that the
number of events where data was compromised increased a record 78% in 2203 over
the previous year, although the number of victims decreased by 16%.

Darren James, senior product manager for Specops, said it was interesting that
the RedLine malware was responsible for nearly half of the stolen passwords the
company analyzed, adding that its report also highlights how many passwords are
for sale on the dark web. 

James cautioned users not to reuse passwords, adding that it was vital for
security professionals to continuously scan Active Directory for breached or
compromised passwords.


Stephen Weigand

Stephen Weigand is managing editor and production manager for SC Media. He has
worked for news media in Washington, D.C., covering military and defense issues,
as well as federal IT. He is based in the Seattle area.


RELATED

Identity

US CHARGES NASHVILLE MAN IN ALLEGED NORTH KOREAN FRAUD SCHEME

Steve ZurierAugust 9, 2024

Nashville “facilitator” alleged to help North Korean IT workers make up to
$300,000 annually.

Privacy

UN OVERWHELMINGLY APPROVES CYBERCRIME TREATY

SC StaffAugust 9, 2024

Attempted modifications to the portions of the draft that received contention
were ultimately thumbed down, resulting in a final draft not far off from
earlier iterations.

Black Hat

FIVE TAKEAWAYS FROM BLACK HAT USA 2024

Rom Carmel August 9, 2024

Identity security and AI take center stage at this year’s Black Hat.




RELATED EVENTS

 * 
   Cybercast
   
   KEY IDENTITY GUIDANCE FOR LATE 2024 AND EARLY 2025
   
   Wed Sep 11

 * 
   Cybercast
   
   IDENTITY RESILIENCE: THE MISSING PIECE TO SECURING YOUR IDENTITIES
   
   On-Demand Event

 * 
   Cybercast
   
   IDENTITY SECURITY AND USER EXPERIENCE – THERE SHOULDN’T BE A TRADE-OFF
   
   On-Demand Event

ADVERTISEMENT




GET DAILY EMAIL UPDATES

SC Media's daily must-read of the most current and pressing daily news
Business Email

By clicking the Subscribe button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Subscribe

ADVERTISEMENT



ADVERTISEMENT




--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms of Use.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies