BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /RedLine Admin Extradited as PolyShell Hits 56% of Vulnerable Magento Stores

RedLine Admin Extradited as PolyShell Hits 56% of Vulnerable Magento Stores

March 26, 2026Malware & Threats4 min readhigh

Originally reported by BleepingComputer, Graham Cluley, Malwarebytes Labs, SecureList (Kaspersky)

#redline-infostealer#polyshell#magento#ai-supply-chain#citrix-netscaler#extradition#cryptocurrency-theft
Share

TL;DR

Law enforcement scored a major win with the extradition of a RedLine infostealer administrator, while active campaigns target Magento stores and cryptocurrency wallets. Meanwhile, AI platforms face new supply chain and abuse vectors.

Why high?

The extradition of a RedLine administrator represents a significant law enforcement action against one of the most prolific infostealer operations, while PolyShell attacks targeting over half of vulnerable Magento stores indicate widespread active exploitation.

Law Enforcement Strikes Back

RedLine Administrator Faces US Justice

An Armenian suspect has been extradited to the United States to face criminal charges for allegedly managing RedLine, one of the most prolific infostealer malware operations in recent years. RedLine has been responsible for stealing millions of credentials and personal data from victims worldwide, making this extradition a significant milestone in international cybercrime prosecution.

Crime Tipster Database Allegedly Compromised

A hacktivist group claims to have obtained sensitive data on crime tipsters and the people they reported, with records dating back to 1987. The breach allegedly exposes the identities of confidential informants, potentially putting vulnerable individuals at risk.

Active Campaign Alerts

PolyShell Attacks Target Majority of Vulnerable Magento Stores

Attackers are leveraging the PolyShell vulnerability to target more than half of all vulnerable Magento Open Source and Adobe Commerce version 2 installations. The campaign represents a systematic exploitation of e-commerce platforms, with attackers moving aggressively against unpatched systems.

New Torg Grabber Targets 728 Cryptocurrency Wallets

A newly discovered infostealer called Torg Grabber is harvesting sensitive data from 850 browser extensions, with over 700 targeting cryptocurrency wallets specifically. The malware demonstrates the continued evolution of credential theft tools to target the growing cryptocurrency ecosystem.

Bubble Platform Abused for Microsoft Credential Theft

Threat actors are bypassing phishing detection systems by abusing the no-code app-building platform Bubble to generate and host malicious web applications targeting Microsoft accounts. This technique allows attackers to leverage legitimate infrastructure for credential harvesting campaigns.

AI Platform Security Concerns

Premium AI Accounts Enter Underground Economy

Flare Systems research reveals that premium AI service accounts have become a hot commodity in underground markets, sold alongside traditional cybercrime tools like email accounts and VPS access. Criminal actors are bundling and reselling AI platform access at scale, indicating the integration of AI services into the cybercrime supply chain.

LiteLLM Gateway Compromised in Supply Chain Attack

Kaspersky researchers dissected a supply chain attack targeting LiteLLM, a multifunctional gateway used in many AI agents. The attack demonstrates how threat actors are targeting AI infrastructure to steal sensitive data from organizations deploying AI solutions.

Critical Infrastructure Updates

Citrix Patches NetScaler Vulnerabilities

Citrix has released patches for two NetScaler ADC and NetScaler Gateway vulnerabilities, with one flaw showing similarities to the previously exploited CitrixBleed and CitrixBleed2 vulnerabilities. The company is urging administrators to apply patches immediately given the critical nature of these systems.

FCC Router Ban May Compromise Home Security

The FCC announced restrictions on routers manufactured outside the US, but security experts warn the policy could inadvertently leave home networks less secure. The regulatory approach may limit access to security-focused router firmware and features.

Industry Updates

Kali Linux 2026.1 Released

The penetration testing distribution's first release of the year includes eight new security tools, a visual theme refresh, and a new BackTrack mode for Kali-Undercover. The update continues the platform's evolution as a comprehensive security testing environment.

Meta Platforms Face Legal Scrutiny

Landmark court verdicts are beginning to examine how social media platforms are engineered, moving beyond content moderation to question fundamental design decisions. The cases represent a shift toward holding platforms accountable for their underlying architecture and engagement mechanisms.

Sources

  • Suspected RedLine infostealer malware admin extradited to US
  • PolyShell attacks target 56% of all vulnerable Magento stores
  • Bubble AI app builder abused to steal Microsoft account credentials
  • New Torg Grabber infostealer malware targets 728 crypto wallets
  • Citrix urges admins to patch NetScaler flaws as soon as possible
  • Paid AI Accounts Are Now a Hot Underground Commodity
  • Kali Linux 2026.1 released with 8 new tools, new BackTrack mode
  • Smashing Security podcast #460
  • Landmark verdicts put Meta's "addiction machine" platforms on trial
  • Hackers claim to have accessed data tied to millions of crime tipsters
  • New FCC router ban could leave home networks less secure
  • An AI gateway designed to steal your data

Originally reported by BleepingComputer, Graham Cluley, Malwarebytes Labs, SecureList (Kaspersky)

Tags

#redline-infostealer#polyshell#magento#ai-supply-chain#citrix-netscaler#extradition#cryptocurrency-theft

Tracked Companies

🇺🇸Meta Platforms

Related Intelligence

  • AppsFlyer Web SDK Compromised in Supply Chain Attack Targeting Cryptocurrency

    highMar 15, 2026
  • TeamPCP Trojans LiteLLM Package in Supply Chain Attack

    highMar 25, 2026
  • Weekly Threat Roundup: Government Breaches, Geopolitical Wiper Attacks, and Mass Data Exposures

    highMar 24, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← RSAC 2026 Highlights: EU Leadership, AI-Driven Threats, and Industrial-Scale Identity Abuse

Next Article

Google Begins Android 17 Post-Quantum Cryptography Migration→