Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

US Offering $10 Million Reward for RedLine Malware Developer

Posted on June 6, 2025June 6, 2025 By CWS

The US Division of State, by its Rewards for Justice program, is providing a reward of as much as $10 million for data on Maxim Alexandrovich Rudometov, a person accused of being a developer and administrator of the RedLine information-stealer malware.

RedLine is a chunk of malware that permits cybercriminals to steal priceless data from compromised methods, together with credentials, cryptocurrency wallets, and different monetary data.

In late October 2024, legislation enforcement companies in six nations introduced disrupting the infrastructure related to RedLine, in addition to the infostealer named Meta. As a part of the operation, authorities shut down servers, seized domains, and arrested two individuals.

On the time of its disruption, RedLine had been used — below a malware-as-a-service mannequin — by greater than 20 Russian-speaking cybercrime teams, which leveraged it to steal the knowledge of hundreds of thousands of customers worldwide, in addition to in intrusions involving essential infrastructure and main organizations. 

When RedLine infrastructure was disrupted, the US introduced expenses in opposition to Rudometov, accusing him of growing the malware and serving to handle its infrastructure.

The US has now introduced a reward of as much as $10 million for data that may result in the arrest of Rudometov, recognized on-line as dendimirror, alinchok, ghackihg, makc1901, navi_ghacking, and bloodzz.fenix. 

In response to authorities, Rudometov was born in Ukraine and fled to Russia at the beginning of the 2022 invasion of Ukraine. 

There don’t look like any current studies describing assaults involving the RedLine malware, however the wording within the Rewards for Justice announcement means that the infostealer should be lively.Commercial. Scroll to proceed studying.

“Anybody with data on overseas authorities linked associates of Rudometov, or their malicious cyber actions, or overseas government-linked use of RedLine malware, ought to contact Rewards for Justice through the Tor-based tips-reporting channel,” reads the announcement. 

Suggestions will be submitted by a number of channels, together with Telegram, Sign, WhatsApp, and a Tor-based web site.

Associated: US Providing $2.5 Million Reward for Belarusian Malware Distributor

Associated: US Providing $10 Million Reward for Iranian ICS Hackers

Associated: US Provides $10 Million Reward for Info on North Korean Hacker

Security Week News Tags:Developer, Malware, Million, Offering, RedLine, Reward

Post navigation

Previous Post: New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack
Next Post: HPE Patches Critical Vulnerability in StoreOnce

Related Posts

In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias Security Week News
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication Security Week News
AI Emerges as the Hope—and Risk—for Overloaded SOCs Security Week News
In Other News: X Fined €120 Million, Array Flaw Exploited, New Iranian Backdoor Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing
  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing
  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark