3 links
tagged with all of: cybersecurity + infostealers
Click any tag below to further narrow down your results
Links
Infostealers have evolved into powerful, user-friendly tools for cybercriminals, enabling the silent theft of sensitive information without detection. These malware variants, often available through malware-as-a-service platforms, are extensively used for credential theft and other malicious activities. Their success hinges on speed and stealth, allowing them to operate without leaving traces.
Google has removed over 3,000 YouTube videos that were part of a malware distribution campaign known as the "YouTube Ghost Network," which used fake tutorials to lure viewers into downloading infostealers disguised as cracked software. The operation, which surged in 2025, involved compromised accounts that created a facade of legitimacy through engagement metrics like likes and comments. Check Point's research highlights the evolution of malware distribution tactics, emphasizing the potential dangers of seemingly trustworthy online content.
A significant rise in identity-based cyberattacks, driven by advanced phishing kits and infostealers, has led to a 156% increase in login-targeting attacks, making them 59% of all investigations by eSentire. Organizations are urged to adopt stronger security measures, such as passkeys, to combat the growing threat of business email compromise (BEC) and ransomware, which are often facilitated by phishing-as-a-service platforms.