ESET Online Scanner for
Redline and META

Deze pagina is ook beschikbaar in het Nederlands

 
It is important to note that our regular ESET solutions already detect these forms of malware.

ESET Online Scanner for Redline and META

System requirements

Supported operating systems: 
Microsoft Windows 11/10/8.1/8/7
MacOS, Android and IOS are not supported

Required disk space 
350MB (minimum), 400MB (optimum)

Required memory:
500MB

I ran the scan, how should I proceed?

An infostealer has been detected

An infostealer has been detected
 

  1. Run a full system scan
    Did you opt for the Quick Scan? Then perform a full system scan via the Online Redline/Meta scanner. This can help detect and remove the malware. If you have already done a full scan, you can move on to step 2.

  2. Change your passwords
    After the malware is removed by the full scan, change your passwords immediately, especially those of important accounts such as email, online banking, social media, and work accounts. Where possible, add two-factor authentication to your accounts for extra security. We also recommend using a password manager, as this makes it easier to have strong, unique passwords for each account without having to remember them all.

  3. Check financial and personal accounts
    Keep a close eye on your bank statements for suspicious activity. Report suspicious transactions to your bank immediately. If sensitive information such as payment details or login details for company accounts have been stolen, report it to the involved parties so that they can also take security measures.

  4. Update your operating system and security software
    Perform system updates to fix known vulnerabilities in your operating system and software. We also recommend using a firewall and considering additional layers of security such as a VPN.

  5. Monitor your accounts over the long term
    Stay alert to unusual activity. Keep checking your accounts and devices regularly, even after cleaning your system. Some attacks can lead to persistent risks such as identity theft.

  6. Involve an expert
    If you are unsure whether the malware has been completely removed or if your sensitive (business) information is at stake, it is wise to hire an expert who can fully investigate and secure your system.

Nothing has been detected, what now?

Nothing has been detected, what now?
 

  1. Keep your software and systems up-to-date
    Make sure your operating system, antivirus software, and all applications (such as browsers, plug-ins and other tools) are always up-to-date with the latest security patches. This is easiest by enabling automatic updates.

  2. Install reliable security software
    Install reliable security software, which can continuously scan your system and detect suspicious activity. Make sure the software offers real-time protection so potential threats are intercepted immediately.

  3. Use strong, unique passwords
    Do not use simple and short passwords. Choose passphrases that are more secure and easier to remember. Also, use different passwords for each account. A password manager can help generate and store strong, unique passwords for each account.

  4. Enable two-step verification (2FA)
    Enable two-step authentication (2FA) for all your important accounts. This makes it harder for attackers to gain access even if they manage to get your password. Instead of SMS codes, use apps like Google Authenticator or Microsoft Authenticator for an extra secure 2FA option.

  5. Use a firewall and VPN 
    A firewall blocks unauthorised access to your network and provides an extra layer of protection against threats. Many digital security solutions have a built-in firewall. Also consider using a VPN (Virtual Private Network) if you connect to public networks. This ensures that your data is encrypted and protects you from attacks that intercept your connection.

An infostealer, what exactly is that?

What are infostealers?
Infostealers are malware programs that steal sensitive information from infected devices. They pose a high risk because they are difficult to detect.

Infostealers invade systems to collect data such as login credentials, financial information, personally identifiable information (PII), emails and system information. This information is sent to cybercriminals, who can sell or use it for identity theft, financial fraud and spreading ransomware.

What is Redline and Meta?
Redline Stealer is a popular info stealer sold by cybercriminals through a malware-as-a-service model. This makes it easier for less-technical criminals to steal personal data such as login credentials, financial information and details of various applications. Meta Stealer is alike to Redline and works in a similar way.

Read more

Persbericht

Internationale opsporingsdiensten ontmantelen infostealers

In een internationale actie op 28 oktober zijn de infostealers RedLine en META ontmanteld, met steun van Team Cybercrime Limburg.

Website

Operation Magnus

On the 28th of October 2024 the Dutch National Police, working in close cooperation with the FBI and other partners of the international law enforcement task force Operation Magnus, disrupted operation of the Redline and Meta infostealers.

Artikel

Wat kun je doen tegen infostealers RedLine en Meta

ESET Nederland, de Cyber Crime Unit Limburg en Europol werken samen tegen infostealers zoals RedLine en META, met focus op bewustwording en infectiecontrole.

Still have questions?

Get in touch via one of the channels below, we are available in Dutch and English

E-mail

mon - fri: 9:00 - 17:30

sat: 12:00 - 17:00

Phone

mon - fri: 9:00 - 17:30

sat: 12:00 - 17:00

WhatsApp

mon - fri: 9:00 - 17:30

 

Social Media 

mon - fri: 9:00 - 17:30