Click any tag below to further narrow down your results
Links
This article outlines the rise of infostealers as a major threat to identity security, highlighting their role in ransomware and data breaches. It offers practical strategies for detecting and managing these attacks, emphasizing the importance of monitoring stolen identities and utilizing operational intelligence.
A hacker group called Zestix has exploited vulnerabilities in around 50 companies by stealing credentials through infostealers. The breaches occurred primarily because these organizations failed to implement multifactor authentication (MFA), allowing attackers to access sensitive data easily.
Infostealers have evolved into powerful, user-friendly tools for cybercriminals, enabling the silent theft of sensitive information without detection. These malware variants, often available through malware-as-a-service platforms, are extensively used for credential theft and other malicious activities. Their success hinges on speed and stealth, allowing them to operate without leaving traces.
Google has removed over 3,000 YouTube videos that were part of a malware distribution campaign known as the "YouTube Ghost Network," which used fake tutorials to lure viewers into downloading infostealers disguised as cracked software. The operation, which surged in 2025, involved compromised accounts that created a facade of legitimacy through engagement metrics like likes and comments. Check Point's research highlights the evolution of malware distribution tactics, emphasizing the potential dangers of seemingly trustworthy online content.
A significant rise in identity-based cyberattacks, driven by advanced phishing kits and infostealers, has led to a 156% increase in login-targeting attacks, making them 59% of all investigations by eSentire. Organizations are urged to adopt stronger security measures, such as passkeys, to combat the growing threat of business email compromise (BEC) and ransomware, which are often facilitated by phishing-as-a-service platforms.