Infostealer-driven malware infections continue to increase, driven largely by user behavior, not by exploiting software vulnerabilities. In 2024 alone, over 29 million stealer logs were shared across cybercrime platforms.
A recent study by Flare Systems analyzed 1,000 infection-time screenshots captured by the Aurora infostealer. The objective was to understand how users ended up installing the malware. The findings point to familiar patterns and human behavior, downloading free tools, relying on untrusted sources, and disabling security protections.
Cracked software was the most common infection vector, responsible for 28.3% of the cases. Users were seen attempting to download pirated versions of:
These downloads often came from YouTube video tutorials, with links pointing to file-sharing sites like mega.nz, telegra.ph, or cutt.ly. Files were typically zipped, password-protected, and accompanied by instructions to disable antivirus.
Zoom image will be displayed
In 7.4% of infections, users were installing cheats or mods for games like Minecraft, Fortnite, Roblox, and Valorant. Common file names included “Galaxy Skin Swapper” and “Minecraft ModPack.” These were often shared via YouTube descriptions or unofficial modding forums.
Another key infection method was malicious Google Ads. Campaigns like “Blitz Java” and “Zero MidJourney” used paid ads to promote fake download pages. For example, someone searching for “Java download” might click on a top ad linking to a fake site like java-gapp.space, which served malware inside a zip file disguised as an installer.
Users themselves enabled these infections. Screenshots showed people:
These behaviors — not software vulnerabilities — drove the infections.
The study found infections across systems in Italian, French, Portuguese, Hindi, Arabic, and more. These tactics worked across languages and regions, showing the global scale of user-driven malware infections.
Instead of analyzing malware code or exhaustively combing through stealer logs, the study focused on visual artifacts — screenshots taken during infection. Flare used GPT-4o-mini to extract structured data from screenshots. The model reached:
Zoom image will be displayed
This method enabled scalable threat intelligence without needing access to logs or malware samples.
The infections didn’t rely on zero-days or complex exploits. They worked because of predictable human behaviors:
The study shows that infostealer malware thrives not on technical breakthroughs —but on predictable user behavior
Zoom image will be displayed
LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora — https://arxiv.org/pdf/2507.23611