Alleged RedLine malware developer extradited to US, faces up to 30 years

Alleged RedLine malware developer extradited to US, faces up to 30 years

Summary

An Armenian national, Hambardzum Minasyan, has been extradited to the US and appeared in federal court after prosecutors accused him of being a leading developer and administrator of the RedLine infostealer. He is indicted on conspiracy charges alleging access device fraud, violations of the Computer Fraud and Abuse Act, and money laundering — offences that together carry up to 30 years in prison.

Prosecutors say Minasyan maintained RedLine’s infrastructure, including admin panels, servers and domains, provided customer service to affiliates, collected payments and laundered proceeds through cryptocurrency exchanges. His extradition follows an October 2024 international takedown of RedLine infrastructure and prior charges against another alleged developer, Maxim Rudometov.

RedLine, sold since March 2020, has been used in thousands of attacks across more than 150 countries to steal credentials, payment data, crypto wallets and VPN logins, with a sizeable share of stolen credentials on dark‑web markets attributed to the malware.

Key Points

  • Hambardzum Minasyan extradited to the US and indicted on multiple conspiracy charges related to RedLine.
  • Charges include conspiracy to commit access device fraud, conspiracy to violate the Computer Fraud and Abuse Act, and conspiracy to commit money laundering.
  • Prosecutors allege he maintained RedLine infrastructure, ran domains and repositories, provided affiliate support, and laundered proceeds via cryptocurrency exchanges.
  • RedLine has operated since 2020 and was used in thousands of attacks across 150+ countries to harvest credentials and financial data.
  • Minasyan’s extradition follows a multinational takedown in October 2024 and prior charges against another alleged RedLine developer.
  • Authorities have targeted associated bulletproof hosting services and highlighted RedLine’s central role in credential theft on dark‑web markets.

Why should I read this?

Short version: this is a big deal. If you work in security, run systems, or just care about online safety, the arrest and extradition show law enforcement can and will chase developers who build mass‑market malware. It also explains where a huge chunk of stolen credentials on the dark web came from — useful intel without you having to trawl court filings.

Context and Relevance

This case underlines several wider trends: the persistence of commodity infostealers that fuel credential markets, growing international co‑operation on cyber law enforcement, and the role of crypto in laundering criminal proceeds. For defenders, it reaffirms why credential hygiene (MFA, password managers, monitoring for leaked credentials) and rapid incident response matter. For policy and legal teams, it highlights continued pressure on hosting providers and service enablers used by malware operators.

Source

Source:https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years