Over the past seven years, Flashpoint has observed a significant rise in the use of infostealer malware. Their simplicity, vast availability, and low costs have made them extremely popular among threat actors, making infostealers an increasingly primary vector for ransomware and other high-impact data breaches. Therefore, it is crucial for organizations to protect themselves against this growing threat. In this blog, we explain the risks posed by infostealer malware and outline the essential steps security teams can take to ensure the integrity of sensitive data.
The Evolution and Rise of Stealer Malware
Learn what stealers are, how they work, and what malicious actors are doing with compromised data.
Infostealers are a type of malware designed specifically to harvest sensitive information, such as login credentials (commonly referred to as “logs”) from infected systems. Logs are incredibly valuable for threat actors—especially those related to third-party software-as-a-service applications such as Salesforce, Slack or Microsoft Office 365—since compromised credentials can allow them to infiltrate and move laterally within systems.
Even one compromised credential can result in a data breach or cyberattack. For example, in January 2024, a major European telecommunications company suffered a massive network outage that impacted around half of its network’s traffic. The root cause was traced to a single weak password that was exposed by infostealer malware.
Depending on the strain of infostealer, threat actors can adapt their TTPs to bypass security measures, making it imperative for organizations to implement comprehensive defenses. The following tags from MITRE ATT&CK helps define the usual TTPs affiliated with information-stealing malware:
One of the most effective ways to protect against infostealers is to ensure that specific, targeted security measures are in place. This is even more important as organizations increasingly rely on third-party services and platforms. The following best practices will significantly mitigate risk posed by infostealers:
While many of these best practices are well established and generally implemented, security teams must remember that compliance is only the first step. For example, some systems and software may not require MFA or prompt users to update passwords. However, it is critical that organizations mandate the use of MFA or 2FA and routinely update credentials. Even though these steps are basic, threat actors often infiltrate victim systems by exploiting these gaps, even in larger organizations.
After ensuring that foundational protections are in place, organizations looking to protect against infostealer malware need to monitor illicit marketplaces for any stolen logs that are alleged to stem from your organization or associated third parties. However, without a comprehensive source of threat intelligence, doing so will be a major challenge—as there are tens of thousands of Telegram channels, subscription log services, and log shops.
Flashpoint has observed multiple instances of malicious actors attempting to gain access to organizations via the following domains:
Using Flashpoint, organizations can inventory their infrastructure and share any internal domains with our analysts. Doing so creates custom alerts that notifies security teams of any potential incidents leveraging Flashpoint’s massive collections.
In addition to monitoring, organizations may want to consider proactively acquiring logs themselves and removing them from illicit marketplaces. Using Flashpoint’s Requests for Information (RFI) service, organizations can request our intelligence analysts to acquire the listing on their behalf and take precautions to remove it from log shops.
Ultimately, organizations need to stay informed about emerging infostealer trends and techniques. New variations of infostealers are constantly being advertised on illicit marketplaces and each variant improves its ability to bypass defensive measures.
Leveraging a comprehensive source of threat intelligence like Flashpoint Ignite provides security teams with unparalleled visibility into the threat landscape. Through a single easy-to-use platform, organizations gain insight into the deep and dark web, open source intelligence, vulnerabilities, and breach data. Armed with Flashpoint’s massive collections and finished intelligence reports, security teams can stay ahead of potential threats.
Infostealer malware poses significant risks to organizations, but with the right security measures informed by the best data and intelligence, these risks can be mitigated. By following these steps, security teams can build a resilient defense against infostealers, ensuring robust protection for critical assets. Sign up for a demo to learn how you can better protect yourself today.