ESET Eesti Blogi

They’re coming for your data: What are infostealers and how do I stay safe?

In the world of cybercrime, information is a means to an end. And that end, more often than not, is to make money. That’s why information-stealing (infostealer) malware has risen to become a major driver of identity fraudaccount takeover and digital currency theft. But there are also plenty of people that live much of their daily lives online and manage to stay safe. The key is to understand how to manage digital risk effectively.

Here’s what you need to know to keep your personal and financial information out of harm’s way.

What kind of info do infostealers steal?

Many infostealers may trace their roots back to an “iconic” bit of malware: a banking Trojan known as ZeuS that was designed to covertly steal victims’ financial information, such as online banking logins. When its source code was leaked in 2011, new versions flooded the cybercrime underground and the burgeoning infostealer industry began in earnest, with developers upgrading and customizing its capabilities. Today there are versions built for just about every computing platform, from Windows PCs and macOS computers to iOS and Android devices.

What infostealers are after depends on the variant. Logins, and session cookies, which could enable hackers to bypass multifactor authentication (MFA), are a popular target. One report estimates that 75% (2.1 billion) of the 3.2 billion credentials stolen last year were harvested via infostealers. Other personal and financial information that could be at risk includes:

How do infostealers work?

The aim of the malware is to silently and rapidly find sensitive information on your machine or device and then exfiltrate it to a server under the control of your attackers. It will do so by raiding web browsers, email clients, crypto wallets, files, applications and the operating system itself. Other techniques include:

Once the information has been sent back to an adversary’s server, often within seconds, they typically package it up into logs and sell it on the cybercrime underground. Fraudsters will then use it to:

Figure 1. Splash screen shown by the Vidar infostealer installer and impersonating Midjourney (source: ESET Threat Report H1 2024)

How do I get compromised with infostealers?

The first step towards staying safe from infostealers is understanding how they spread. There are various vectors for attack, but the most common include:

Figure 2. GitHub repository spreading Lumma Stealer and spotted by ESET researchers (source: ESET Threat Report H2 2024)

Peering into the threat landscape

As ESET reveals in its H2 2024 Threat Report the infostealer market is big business for cybercriminals. The malware-as-a-service (MaaS) model has democratized access to many of the infostealer variants available on criminal marketplaces. Some of these sites also offer log parsing services to help cybercriminals extract data from raw logs for use or resale.

As ESET observes, these pieces of malware are under constant development. Formbook, for example, has been in operation since 2021. But most recently, it has added sophisticated obfuscation techniques, designed to make sampling and analysis by security researchers more difficult. Other variants, like RedLine, have disappeared due to coordinated law enforcement action. But others, such as Lumma Stealer, simply move in to take their place. This variant  recorded a 369% annual increase in detections in H2 2024, according to ESET research.

How do I steer clear of infostealers?

So how can you make sure an infostealer doesn’t end up on your mobile device or computer? Given that the malware can be spread via multiple methods, you’ll need to remember several best practices. These include:

The trick is to layer up these measures, thus reducing the avenues for attack open to threat actors. But remember too that they will continue to try and develop new workarounds, so vigilance is key.

Exit mobile version