Google Advertising Used To Distribute RedLine Stealer
A malvertising campaign was discovered mimicking websites belonging to well-known software such as Notepad++ and Blender 3D to drop the RedLine information stealer.
An unregistered version of .NET Reactor was used to protect the loader malware from debuggers and multiple PowerShell commands were used to download the malware from an external location.
The payload was loaded directly into the memory of a process to avoid detection.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe