Threat intelligence API Docs Pricing Solutions Resources Contact us

Threat reports

Read other reports

Signs of Ongoing RedLine Stealer Operation Found through a DNS Deep Dive





RedLine Stealer gained prominence for its affordability. But since the exposure of its underlying infrastructure, the malware’s operators may have changed some of their tools and tactics.

The TIP research team recently amassed 53 domains identified as RedLine Stealer indicators of compromise (IoCs), which were then subjected to an expansion analysis that led to the discovery of:

  • Five public email addresses from the IoCs’ WHOIS records
  • 91 email-connected domains
  • Five IP addresses to which the domains identified as IoCs resolved, one of which turned out to be a private host
  • One IP-connected domain

Download a sample of the threat research materials now or contact us to access the complete set of research materials.

Read other reports
To download the full report in PDF, please fill in the form.
I have read and agree to the Terms of Service and Privacy Policy
Please keep me updated on news, events, and offers.

Try our Threat Intelligence API for free

Get FREE trial
Have questions?

We work hard to improve our services for you. As part of that, we welcome your feedback, questions and suggestions. Please let us know your thoughts and feelings, and any way in which you think we can improve our product.

For a quick response, please select the request type that best suits your needs.

Or shoot us an email to

Threat Intelligence Platform uses cookies to provide you with the best user experience on our website. They also help us understand how our site is being used. Find out more here. By continuing to use our site you consent to the use of cookies.