RedLine Infostealer Developer Extradited to United States
Hambardzum Minasyan, an alleged administrator and developer of the RedLine infostealer malware, has been extradited to the United States and appeared in an Austin federal court this week. He faces charges of conspiracy to commit access device fraud, conspiracy to violate the Computer Fraud and Abuse Act, and conspiracy to commit money laundering, carrying a combined maximum sentence of 30 years in prison.
The RedLine Operation
RedLine was one of the most prolific infostealer malware families in operation globally between 2020 and 2024. The malware was designed to harvest credentials, financial data, browser cookies, cryptocurrency wallet information, and other sensitive data from infected devices. It operated on a malware-as-a-service model, with affiliates paying for access to deploy the malware against their own targets.
Prosecutors allege that Minasyan maintained the digital infrastructure behind RedLine, including the administrative panels and command-and-control servers that enabled affiliates to deploy the malware and collect stolen data at scale. He is also accused of providing customer service to affiliates and coordinating the theft of financial information.
International Law Enforcement Coordination
The extradition follows the October 2024 international takedown of RedLine infrastructure, which involved the US Department of Justice and law enforcement agencies across the Netherlands, Belgium, and other European countries. That operation, known as Operation Magnus, resulted in the seizure of RedLine servers and the charging of co-conspirator Maxim Rudometov. Minasyan’s extradition represents a continuation of that enforcement action and demonstrates the sustained international commitment to prosecuting the operators behind major malware platforms.
Implications for Australian Organisations
RedLine’s impact on Australian organisations and individuals has been significant. Credentials stolen by RedLine and similar infostealers are routinely traded on criminal marketplaces and used to fuel business email compromise, account takeover attacks, and downstream ransomware incidents. The dismantling of the RedLine infrastructure does not eliminate the data already in circulation. Organisations that have not recently audited their credential exposure should consider doing so.
The Australian Institute of Cyber Security recommends that organisations implement multi-factor authentication across all externally accessible systems, conduct regular credential exposure assessments, deploy endpoint detection and response solutions capable of identifying infostealer activity, and maintain an incident response plan that addresses credential compromise scenarios.
How AICS Can Help
AICS provides cyber attack assistance, data breach assistance, and identity protection services for organisations and individuals affected by credential theft and infostealer malware. Our accredited professionals can assist with incident assessment, containment, and recovery. Contact help@cybersecurity.com.au for assistance.
Source: The Record – Alleged RedLine malware developer extradited to US, faces up to 30 years

Comments are closed