Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

US to Offer $10 Million Reward for Details About RedLine Malware Developer

Posted on June 6, 2025June 6, 2025 By CWS

The USA Division of State’s Rewards for Justice program has introduced a considerable bounty of as much as $10 million for data resulting in the identification or location of people concerned in malicious cyber actions towards U.S. essential infrastructure.

The reward particularly targets these appearing below overseas authorities course who violate the Laptop Fraud and Abuse Act (CFAA), with explicit concentrate on Maxim Alexandrovich Rudometov, the developer behind the infamous RedLine data stealer malware.

Ukrainian Developer Behind International Cyber Menace

Maxim Alexandrovich Rudometov (Максим Александрович Рудомётов), born in 1999 in Ukraine’s Luhansk area, stands accused of growing and distributing the RedLine malware, one of many world’s most prevalent information-stealing applications. 

Working below a number of on-line aliases together with “dendimirror,” “alinchok,” “ghackihg,” “makc1901,” “navi_ghacking,” and “bloodzz.fenix,” Rudometov has established himself as a key determine within the world cybercrime ecosystem.

The 26-year-old developer fled to Krasnodar, Russia, in February 2022 following Russia’s invasion of Ukraine.

U.S. authorities point out that Rudometov maintains energetic management over RedLine’s technical infrastructure and possesses cryptocurrency accounts used for receiving and laundering funds from malware operations. 

His continued involvement in managing the malware’s backend programs demonstrates the continuing menace posed by his prison enterprise.

RedLine capabilities as a sophisticated infostealer designed to extract delicate information from compromised programs, together with usernames, passwords, monetary data, system configurations, browser cookies, and cryptocurrency pockets credentials. 

The malware harvests this stolen information, collectively known as “logs,” that are subsequently offered on darkish internet cybercrime boards for fraudulent actions and extra cyberattacks.

The malware operates by a complicated Malware-as-a-Service (MaaS) enterprise mannequin, permitting cybercriminals to buy licenses and launch unbiased an infection campaigns. 

This decentralized method has enabled RedLine to contaminate hundreds of thousands of computer systems worldwide, making it some of the profitable malware variants in circulation.

$10M Reward for Information on RedLine Malware

U.S. authorities are actively searching for details about Rudometov’s associates, notably these with connections to overseas governments concerned in malicious cyber actions. 

The investigation additionally extends to monitoring using RedLine malware by overseas governments for state-sponsored cyberattacks towards American pursuits.

People with related data can securely contact the Rewards for Justice program by their Tor-based reporting channel at he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion, which requires the Tor browser for nameless entry. 

This encrypted communication technique ensures the protection and confidentiality of potential informants.

The substantial $10 million reward displays the intense menace posed by RedLine malware and the U.S. authorities’s dedication to disrupting cybercriminal operations that focus on American essential infrastructure. 

As cyber threats proceed evolving, this case represents a major step in worldwide efforts to carry cybercriminals accountable for his or her actions towards essential programs and civilian targets.

Pace up and enrich menace investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Details, Developer, Malware, Million, Offer, RedLine, Reward

Post navigation

Previous Post: MIND Raises $30 Million for Data Loss Prevention
Next Post: Cybersecurity M&A Roundup: 42 Deals Announced in May 2025

Related Posts

Microsoft Exchange Online Service Down Cyber Security News
Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds Cyber Security News
Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News