Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cybercriminals Exploit Infostealers, Steal 2.1 Billion Credentials
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cybercriminals Exploit Infostealers, Steal 2.1 Billion Credentials

Highlights

  • Cybercriminals used infostealers to steal 2.1 billion credentials last year.

  • Redline was the most prevalent infostealer, infecting 9.9 million hosts.

  • Organizations must enhance security measures to combat infostealer threats.

Ethan Moreno
Last updated: 18 March, 2025 - 11:49 pm 11:49 pm
Ethan Moreno 2 months ago
Share
SHARE

Last year saw a significant surge in cyberattacks as infostealing malware became a primary tool for cybercriminals. These malicious programs harvested vast amounts of sensitive data, enabling a range of attacks from ransomware to breaches targeting critical infrastructure. The widespread use of infostealers underscores the evolving tactics of cyber threats, posing increased risks to both organizations and individuals worldwide.

Contents
How Are Infostealers Increasing Credential Theft?Which Systems Are Most Targeted by Infostealers?What Are the Most Prevalent Infostealer Strains?

Recent reports highlight that the use of infostealers has intensified, with 2.1 billion credentials stolen in the past year alone. This marks a substantial increase compared to previous years, indicating a growing preference among cybercriminals for these versatile tools. The escalation in credential theft has broader implications, affecting various sectors and amplifying the potential impact of cyberattacks.

How Are Infostealers Increasing Credential Theft?

Infostealers were responsible for nearly two-thirds of the 3.2 billion credentials stolen from organizations, according to Flashpoint’s latest report. By focusing on identity and access, cybercriminals managed to steal 33% more credentials in 2024 compared to the previous year.

“Infostealers are proving to be incredibly versatile, contributing to account takeover, increasing data breach totals, acting as initial access vectors to ransomware, as well as assisting in exploitation via vulnerabilities,”

stated Ian Gray, Vice President of Intelligence at Flashpoint.

Which Systems Are Most Targeted by Infostealers?

Flashpoint researchers identified 23 million hosts and devices infected with infostealers, with the majority operating on Microsoft Windows. Corporate systems were particularly vulnerable, with nearly 70% of Windows device infections targeting businesses. Although some infostealers also target MacOS, Windows remains the preferred platform due to its extensive user base and established malware development infrastructure.

What Are the Most Prevalent Infostealer Strains?

The report identified 24 unique infostealer strains available on illicit marketplaces last year. Redline was the most widespread, infecting 9.9 million hosts, which accounted for 43% of all observed infostealer infections in 2024. Other significant strains included RisePro, SteaC, Lumma Stealer, and Meta Stealer. These malware variants are often designed to bypass specific security measures, making them more effective and harder to detect.

The exploitation of stolen credentials has led to major breaches, including attacks on Snowflake customers such as AT&T and Ticketmaster.

“Infostealers are effective tools due to their low costs, ease of use, and accessibility,”

Gray explained, highlighting the threat they pose to large enterprises. The accessibility and affordability of infostealers enable even low-skilled threat actors to execute large-scale attacks.

Organizations must prioritize robust cybersecurity measures, including multi-factor authentication and regular monitoring of credential usage, to mitigate the risks posed by infostealers. Enhanced employee training on recognizing phishing attempts and securing sensitive information can also reduce the likelihood of successful breaches. Investing in advanced threat detection systems will further help in identifying and neutralizing infostealer threats before significant damage occurs.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Apple Nike Sport Band Enhances Workout Readiness for Apple Watch
Next Article Blizzard Teases Return of WoW Classic’s Legendary Ashbringer

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
Tesla Brings Robotaxi to Saudi Arabia as Global Expansion Continues
Electric Vehicle
Tesla Constructs Cortex 2.0 at Giga Texas to Boost Computing Power
Electric Vehicle
G1T4-M1N1 Droid Launch Captivates Star Wars and Tech Fans Alike
Robotics
Elon Musk Shares Tesla Optimus Dance Video
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?