{"id":7349,"date":"2025-04-18T12:25:00","date_gmt":"2025-04-18T09:25:00","guid":{"rendered":"https:\/\/blog.eset.ee\/et\/?p=7349"},"modified":"2025-04-29T14:46:04","modified_gmt":"2025-04-29T11:46:04","slug":"theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/","title":{"rendered":"They\u2019re coming for your data: What are infostealers and how do I stay safe?"},"content":{"rendered":"\n<p>In the world of cybercrime, information is a means to an end. And that end, more often than not, is to make money. That\u2019s why information-stealing (infostealer) malware has risen to become a major driver of&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/ai-driven-identify-fraud-havoc\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity fraud<\/a>,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/so-your-friend-has-been-hacked-could-you-be-next\/\" target=\"_blank\" rel=\"noreferrer noopener\">account takeover<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/crypto-soaring-threats-how-keep-wallet-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">digital currency theft<\/a>. But there are also plenty of people that live much of their daily lives online and manage to stay safe. The key is to understand how to manage digital risk effectively.<\/p>\n\n\n\n<p>Here\u2019s what you need to know to keep your personal and financial information out of harm\u2019s way.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What kind of info do infostealers steal?<\/h2>\n\n\n\n<p>Many infostealers may trace their roots back to an \u201ciconic\u201d bit of malware: a banking Trojan known as ZeuS that was designed to covertly&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/06\/27\/5-ways-cybercriminals-steal-credit-card-details\/\" target=\"_blank\" rel=\"noreferrer noopener\">steal victims\u2019 financial information<\/a>, such as online banking logins. When its source code was leaked in 2011, new versions flooded the cybercrime underground and the burgeoning infostealer industry began in earnest, with developers upgrading and customizing its capabilities. Today there are versions built for just about every computing platform, from Windows PCs and macOS computers to iOS and Android devices.<\/p>\n\n\n\n<p>What infostealers are after depends on the variant. Logins, and session cookies, which could enable hackers to bypass multifactor authentication (MFA), are a popular target. One&nbsp;<a href=\"https:\/\/flashpoint.io\/blog\/flashpoint-global-threat-intelligence-report-gtir-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">report estimates<\/a>&nbsp;that 75% (2.1 billion) of the 3.2 billion credentials stolen last year were harvested via infostealers. Other personal and financial information that could be at risk includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Payment card, bank account and cryptocurrency details (e.g., crypto wallet keys)<\/li>\n\n\n\n<li>Other financial information, including insurance or government welfare (Social Security) details<\/li>\n\n\n\n<li>Browser data including browsing history and any \u201csaved form\u201d data, which could include payment details and passwords<\/li>\n\n\n\n<li>System information about your computer or device<\/li>\n\n\n\n<li>Files stored on your machine\/device including photos and documents<\/li>\n\n\n\n<li>Other personal information including names, phone numbers and addresses<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How do infostealers work?<\/h2>\n\n\n\n<p>The aim of the malware is to silently and rapidly find sensitive information on your machine or device and then exfiltrate it to a server under the control of your attackers. It will do so by raiding web browsers, email clients, crypto wallets, files, applications and the operating system itself. Other techniques include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cForm grabbing,\u201d which involves searching for logins that you may have entered into an online form, before it is send to a secure server<\/li>\n\n\n\n<li>Keylogging, which requires the malware to record every keystroke you make<\/li>\n\n\n\n<li>Taking screenshots of your home screen\/desktop in case any sensitive information is displayed there<\/li>\n\n\n\n<li>Stealing information from the machine\u2019s clipboard<\/li>\n<\/ul>\n\n\n\n<p>Once the information has been sent back to an adversary\u2019s server, often within seconds, they typically package it up into logs and sell it on the cybercrime underground. Fraudsters will then use it to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hijack your online accounts (e.g., Netflix, Uber) with a view to stealing information stored inside and\/or selling access to others<\/li>\n\n\n\n<li>Commit identity fraud, such as applying for credit in your name, or using your cards\/bank account to purchase items<\/li>\n\n\n\n<li>Commit medical\/insurance fraud by obtaining medical treatment\/drugs in your name<\/li>\n\n\n\n<li>Commit tax fraud, by filing tax returns in your name and receiving refunds<\/li>\n\n\n\n<li>Target your contacts with phishing messages or spam<\/li>\n\n\n\n<li>Drain your financial accounts of funds<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-1-1.png\" alt=\"Figure 1. Splash screen shown by the Vidar infostealer installer\" title=\"Figure 1. Splash screen shown by the Vidar infostealer installer and impersonating Midjourney (source: ESET Threat Report H1 2024)\"\/><figcaption class=\"wp-element-caption\"><em>Figure 1. Splash screen shown by the Vidar infostealer installer and impersonating Midjourney (source:&nbsp;<a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ESET Threat Report H1 2024<\/a>)<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How do I get compromised with infostealers?<\/h2>\n\n\n\n<p>The first step towards staying safe from infostealers is understanding how they spread. There are various vectors for attack, but the most common include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing emails\/texts:<\/strong>\u00a0A classic social engineering technique to persuade you to click on malicious links or open an attachment, triggering a covert malware install. The threat actor will usually\u00a0<a href=\"https:\/\/www.welivesecurity.com\/en\/scams\/many-faces-impersonation-fraud-spot-imposter-too-late\/\" target=\"_blank\" rel=\"noreferrer noopener\">impersonate a trusted person, brand or authority<\/a>, including spoofing the sender domain and featuring official logos.<\/li>\n\n\n\n<li><strong>Malicious websites:<\/strong>\u00a0These may be used as part of a phishing campaign or as a standalone \u201casset\u201d. You may be encouraged to download\/click on a link, or the site might trigger a \u201cdrive-by-download\u201d simply by visiting it. Threat actors could use black hat SEO techniques to artificially elevate these sites to the top of the search rankings, so they\u2019re more likely to appear when you look for something online.<\/li>\n\n\n\n<li><strong>Compromised websites:<\/strong>\u00a0Sometimes, hackers compromise legitimate websites that you might visit, by possibly exploiting a browser vulnerability or inserting a malicious ad (malvertising). Both techniques could trigger an infostealer installation.<\/li>\n\n\n\n<li><strong>Malicious apps:<\/strong>\u00a0Legitimate-looking software may\u00a0<a href=\"https:\/\/www.welivesecurity.com\/en\/mobile-security\/attack-copycats-fake-messaging-apps-app-mods\/\" target=\"_blank\" rel=\"noreferrer noopener\">hide a nasty info-stealing surprise<\/a>\u00a0when downloaded. The risk is particularly acute for mobile devices that often aren\u2019t protected as well as computers. Watch out especially for pirated versions of popular games and other software.<\/li>\n\n\n\n<li><strong>Social scams:<\/strong>\u00a0Scammers may try to trick you into clicking through on an enticing social media ad or post, possibly by impersonating a celebrity or even hijacking a legitimate account. Beware offers, prize draws and exclusive content that seem too good to be true.<\/li>\n\n\n\n<li><strong>Game mods\/cheats:<\/strong>\u00a0Unofficial modifications or cheats for video games may contain infostealer malware. In fact,\u00a0<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/tap-estry-threats-targeting-hamster-kombat-players\/\" target=\"_blank\" rel=\"noreferrer noopener\">ESET researchers found<\/a>\u00a0several GitHub repositories claiming to offer farm bots and auto-clickers designed to speed up gameplay on Hamster Kombat. In reality, they were hiding the Lumma Stealer variant.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/04-25\/figure-2-1.png\" alt=\"Figure 2. GitHub repository spreading Lumma Stealer and spotted by ESET researchers\" title=\"Figure 2. GitHub repository spreading Lumma Stealer and spotted by ESET researchers\"\/><figcaption class=\"wp-element-caption\"><em>Figure 2. GitHub repository spreading Lumma Stealer and spotted by ESET researchers (source:&nbsp;<a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h22024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ESET Threat Report H2 2024<\/a>)<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Peering into the threat landscape<\/h2>\n\n\n\n<p>As ESET reveals in its&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">H2 2024 Threat Report<\/a>&nbsp;the infostealer market is big business for cybercriminals. The malware-as-a-service (MaaS) model has democratized access to many of the infostealer variants available on criminal marketplaces. Some of these sites also offer log parsing services to help cybercriminals extract data from raw logs for use or resale.<\/p>\n\n\n\n<p>As ESET observes, these pieces of malware are under constant development. Formbook, for example, has been in operation since 2021. But most recently, it has added sophisticated obfuscation techniques, designed to make sampling and analysis by security researchers more difficult. Other variants, like&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/life-crooked-redline-analyzing-infamous-infostealers-backend\/\">RedLine<\/a>, have disappeared due to coordinated law enforcement action. But others, such as Lumma Stealer, simply move in to take their place. This variant &nbsp;recorded a 369% annual increase in detections in H2 2024, according to ESET research.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do I steer clear of infostealers?<\/h2>\n\n\n\n<p>So how can you make sure an infostealer doesn\u2019t end up on your mobile device or computer? Given that the malware can be spread via multiple methods, you\u2019ll need to remember several best practices. These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Install and keep security software updated<\/strong>\u00a0on all your devices. This will go a long way to keeping you safe from infostealers and other threats.<\/li>\n\n\n\n<li><strong>Be phishing-aware,\u00a0<\/strong>which means that you should avoid clicking on links in any unsolicited messages or open attachments. Always check with the sender independently that they definitely sent you the message. Sometimes, hovering above the \u201csender\u201d domain may reveal that an email was in fact sent by someone else.<\/li>\n\n\n\n<li><strong>Only download software\/apps from official online stores.\u00a0<\/strong>Although malware sometimes creeps onto Google Play, it\u2019s usually taken down swiftly, and these official channels are way safer than third-party stores. Also, avoid\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2022\/07\/12\/play-it-safe-5-reasons-not-download-pirated-games\/\" target=\"_blank\" rel=\"noreferrer noopener\">downloading any pirated or cracked software<\/a>, especially if it\u2019s offered for free.<\/li>\n\n\n\n<li><strong>Keep OS and apps up to date,\u00a0<\/strong>because the\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2022\/10\/24\/5-reasons-keep-software-devices-up-to-date\/\" target=\"_blank\" rel=\"noreferrer noopener\">latest software version<\/a>\u00a0will also be the most secure.<\/li>\n\n\n\n<li><strong>Use caution on social media<\/strong>\u00a0and remember that if an offer seems too good to be true, it usually is. If you\u2019re suspicious, try Googling it to see if it may be a scam. And remember that the accounts of friends and celebrities can also be hijacked to promote scams. Avoid clicking on any unsolicited links.<\/li>\n\n\n\n<li><strong>Enhance security at login<\/strong>\u00a0by using strong, unique passwords for each account, stored in a password manager. And switch on multi-factor authentication (MFA) for all of your accounts. This will offer some protection against certain infostealer techniques such as keylogging, although it is not 100% foolproof.<\/li>\n<\/ul>\n\n\n\n<p>The trick is to layer up these measures, thus reducing the avenues for attack open to threat actors. But remember too that they will continue to try and develop new workarounds, so vigilance is key.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of cybercrime, information is a means to an end. And that end, more often than not, is to make money. That\u2019s why information-stealing (infostealer) malware has risen to become a major driver of&nbsp;identity fraud,&nbsp;account takeover&nbsp;and&nbsp;digital currency theft. But there are also plenty of people that live much of their daily lives online<\/p>\n","protected":false},"author":5,"featured_media":7353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160],"tags":[],"class_list":["post-7349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>They\u2019re coming for your data: What are infostealers and how do I stay safe? - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"They\u2019re coming for your data: What are infostealers and how do I stay safe?\" \/>\n<meta property=\"og:description\" content=\"In the world of cybercrime, information is a means to an end. And that end, more often than not, is to make money. That\u2019s why information-stealing (infostealer) malware has risen to become a major driver of&nbsp;identity fraud,&nbsp;account takeover&nbsp;and&nbsp;digital currency theft. But there are also plenty of people that live much of their daily lives online\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-18T09:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T11:46:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2025\/04\/cybersecurity-infostealers-malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1244\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"They\u2019re coming for your data: What are infostealers and how do I stay safe?\",\"datePublished\":\"2025-04-18T09:25:00+00:00\",\"dateModified\":\"2025-04-29T11:46:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/\"},\"wordCount\":1360,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurity-infostealers-malware.png\",\"articleSection\":[\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/\",\"name\":\"They\u2019re coming for your data: What are infostealers and how do I stay safe? - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurity-infostealers-malware.png\",\"datePublished\":\"2025-04-18T09:25:00+00:00\",\"dateModified\":\"2025-04-29T11:46:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurity-infostealers-malware.png\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cybersecurity-infostealers-malware.png\",\"width\":1244,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"They\u2019re coming for your data: What are infostealers and how do I stay safe?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2025\\\/04\\\/18\\\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"They\u2019re coming for your data: What are infostealers and how do I stay safe? - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/","og_locale":"en_US","og_type":"article","og_title":"They\u2019re coming for your data: What are infostealers and how do I stay safe?","og_description":"In the world of cybercrime, information is a means to an end. And that end, more often than not, is to make money. That\u2019s why information-stealing (infostealer) malware has risen to become a major driver of&nbsp;identity fraud,&nbsp;account takeover&nbsp;and&nbsp;digital currency theft. But there are also plenty of people that live much of their daily lives online","og_url":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2025-04-18T09:25:00+00:00","article_modified_time":"2025-04-29T11:46:04+00:00","og_image":[{"width":1244,"height":700,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2025\/04\/cybersecurity-infostealers-malware.png","type":"image\/png"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"They\u2019re coming for your data: What are infostealers and how do I stay safe?","datePublished":"2025-04-18T09:25:00+00:00","dateModified":"2025-04-29T11:46:04+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/"},"wordCount":1360,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2025\/04\/cybersecurity-infostealers-malware.png","articleSection":["malware"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/","url":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/","name":"They\u2019re coming for your data: What are infostealers and how do I stay safe? - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2025\/04\/cybersecurity-infostealers-malware.png","datePublished":"2025-04-18T09:25:00+00:00","dateModified":"2025-04-29T11:46:04+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2025\/04\/cybersecurity-infostealers-malware.png","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2025\/04\/cybersecurity-infostealers-malware.png","width":1244,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"They\u2019re coming for your data: What are infostealers and how do I stay safe?"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2025\/04\/18\/theyre-coming-for-your-data-what-are-infostealers-and-how-do-i-stay-safe\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/7349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=7349"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/7349\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/7353"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=7349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=7349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=7349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}