RedLine Infostealer Network’s Second Defendant Now Faces a U.S. Court
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细读一下文章内容。 文章讲的是一个叫做RedLine的恶意软件网络,它被国际执法机构 dismantled 之后,又有一个被告从亚美尼亚被引渡到美国受审。主要人物是Hambardzum Minasyan,他面临三项指控,包括访问设备欺诈、计算机欺诈和洗钱。RedLine作为恶意软件即服务的模式,允许核心开发者将平台授权给 affiliates,后者通过各种手段传播恶意软件,窃取用户数据。 另外,文章还提到Operation Magnus行动,这是国际执法机构联合打击RedLine和Meta信息窃取器的操作。他们 seizing 了服务器和通讯渠道,并且恢复了一个包含数千客户的数据库,这帮助他们继续进行后续的起诉。 所以总结的话,需要包括RedLine的信息窃取器、被告Minasyan被引渡、他的指控、以及Operation Magnus行动的结果。还要提到这个行动是国际合作的结果,并且执法机构继续利用获得的情报进行起诉。 现在我要把这些要点浓缩到100字以内。确保不遗漏关键信息:RedLine是什么,谁被引渡了,他面临什么指控,以及这次行动的影响。 可能的结构是:国际执法摧毁RedLine恶意软件网络后,第二名被告从亚美尼亚引渡至美国受审。该男子面临三项指控,并参与了恶意软件的部署和支付收集。Operation Magnus行动展示了国际合作的重要性,并持续利用情报进行起诉。 检查一下字数是否在限制内,并且表达清晰。 </think> 国际执法摧毁RedLine信息窃取器网络后,第二名被告从亚美尼亚引渡至美国受审。该男子面临三项指控,并参与了恶意软件的部署和支付收集。Operation Magnus行动展示了国际合作的重要性,并持续利用情报进行起诉。 2026-3-26 07:4:15 Author: thecyberexpress.com(查看原文) 阅读量:5 收藏

Seventeen months after international law enforcement dismantled one of the world’s most damaging infostealing malware networks, a second defendant has arrived in a U.S. federal courtroom — this time extradited from Armenia — as the prosecution of the RedLine infostealer operation continues to work through the criminal network that built and sustained it.

Hambardzum Minasyan, an Armenian national, appeared in an Austin federal court after being extradited to the United States to face charges related to his alleged role in the RedLine infostealer scheme. The Justice Department’s Office of International Affairs secured Minasyan’s arrest and extradition on March 23, 2026, with significant assistance from Eurojust’s ICHIP attorney adviser based at The Hague.

Minasyan faces three counts: conspiracy to commit access device fraud, conspiracy to violate the Computer Fraud and Abuse Act, and conspiracy to commit money laundering. If convicted, he faces up to 10 years in prison on the access device fraud charge and up to 20 years each on the remaining two counts.

An infostealer is malware designed to silently harvest credentials, browser cookies, saved passwords, financial data, and cryptocurrency wallet information from an infected device, then transmit that data to attackers — often in seconds, without any visible sign of compromise.

The indictment alleges that Minasyan and his co-conspirators maintained digital infrastructure, including command-and-control servers and administrative panels, to deploy the malware and collected payments from affiliates using RedLine against victims.

Minasyan specifically registered two virtual private servers and two internet domains to support the RedLine scheme, created repositories on an online file-sharing site to distribute RedLine to affiliates, and registered a cryptocurrency account in November 2021 to receive payments.

report-ad-banner

RedLine operated on a Malware-as-a-Service model. It is a criminal franchise structure where the core developers build and maintain the malware platform, then license it to affiliates who run their own infection campaigns in exchange for a fee. Affiliates distributed RedLine to victims using malvertising, phishing emails, fraudulent software downloads, and malicious software sideloading, with various ruses — including COVID-19 and Windows update lures — used to trick victims into downloading the malware.

RedLine and its derivative Meta infostealer could also enable cybercriminals to bypass multifactor authentication through the theft of authentication cookies and session tokens. Multifactor authentication is a security layer requiring users to verify their identity through a second method beyond a password; stealing session cookies allows attackers to impersonate an already-authenticated user and render that protection useless.

The Lapsus$ threat group used RedLine to obtain passwords and cookies from an employee account at a major technology company and subsequently used that access to obtain and leak limited source code. RedLine also infected hundreds of systems belonging to U.S. Department of Defense personnel, and authorities have described its victim count in the millions globally.

Minasyan’s extradition represents the second defendant charged in connection with Operation Magnus, the joint international takedown announced in October 2024.

Read: Law Enforcement Puts a Damning Dent in RedLine and Meta Infostealer Operations

Operation Magnus — a Joint Cybercrime Action Taskforce operation supported by Europol — resulted in Dutch authorities seizing three servers running the malware, Belgian authorities seizing communication channels and Telegram accounts used by the operators, and the recovery of a database of thousands of RedLine and Meta clients. That client database gave investigators a roadmap for follow-on prosecutions that continues to generate results.

The first defendant charged, Russian national Maxim Rudometov, was identified as a developer and administrator of RedLine and unsealed in the Western District of Texas in October 2024. Rudometov, believed to reside in Krasnodar, Russia, is not expected to face extradition given his location.

Read: U.S. Charges Man Behind RedLine Infostealer that Infected U.S. DoD Personnel Systems

Minasyan’s extradition from Armenia, by contrast, demonstrates the value of maintaining extradition treaty relationships and Eurojust cooperation frameworks that can reach defendants outside of jurisdictions beyond U.S. reach.

The investigation is a joint effort by the FBI Austin Cyber Task Force, which includes the Naval Criminal Investigative Service, IRS Criminal Investigation, the Department of Defense Office of Inspector General’s Defense Criminal Investigative Service, and the Army Criminal Investigation Division.

The case demonstrates a sustained prosecution strategy, where rather than treating Operation Magnus as a one-time disruption event, the DOJ has continued converting the intelligence gained from seized infrastructure and client databases into individual criminal referrals across multiple jurisdictions.


文章来源: https://thecyberexpress.com/redline-infostealer-networks-second-defendant/
如有侵权请联系:admin#unsafe.sh