Stealer[Info]

Everything you need to know about the infostealer malware behind today’s biggest identity-based threats

See recent malware exposures that could impact your organization.

Identity is the new perimeter, infostealer malware is the bad guy that sneaks in

If identity is the new perimeter in cybersecurity, infostealers are the gate-crashers that slip past defenses and dismantle that perimeter from the inside out.

Infostealer malware siphons the very artifacts that form a user’s digital identity, from credentials, session cookies, and browser fingerprints to autofill data. With these assets in hand, attackers can impersonate employees and sidestep MFA, EDR, and other defenses to launch ATO, session hijacking, ransomware, and online fraud campaigns.

The stealthiest stealers that are causing enterprises the biggest headaches

Ninety-five percent of identity teams are “extremely or significantly concerned” about data siphoned from malware-infected devices being used for more harmful attacks, and rightfully so. 

About 1 in 2 corporate users have already been infected on their professional or personal devices. See the latest infostealer exposure data in this year’s report.

SpyCloud currently tracks more than 75 different malware families. These are some of the most troublesome stealers we have eyes on.

What else goes on behind the scenes: MaaS and cybercrime enablement services

Cybercrime has evolved from a DIY operation for highly-skilled threat actors into a sprawling $9 trillion industry where even low-skilled criminals can succeed. Where threat actors once needed technical sophistication, they can now easily outsource through an ecosystem of cybercrime-as-a-service offerings. In this landscape, criminals quickly and easily deploy infostealers at scale.

What AV & EDR tools miss – and you should know

When you get down to it, infostealers are fueling identity attacks more than you probably think. Since the start of this year, our researchers have positively identified that at least 66% of infostealer-infected devices had an antivirus or EDR solution installed at the time of a successful infection – highlighting a critical gap in endpoint protection.

Tips and best practices: Post-infection malware remediation

While identity represents the frontline of modern security – what you know, what you are, and what you have – malware is the tool attackers use to quietly and effectively erode trust in those identities. And because the compromised data lives on after the infection is gone, the threat doesn’t end when the device is wiped.

Post-infection remediation is your best defense for making sure that stolen identity data can’t be weaponized by attackers for account takeover, fraud, session hijacking, or ransomware.

Other new & emerging malware research

Our team at SpyCloud Labs keeps a concentrated focus on the infostealer malware ecosystem, tracking and analyzing existing threats, new trends, and evolving tactics. Here’s some of our latest work.

See recent malware exposures that could impact your organization.