Infostealers: Prevention and Protection against Information Theft

01/08/2024

Infostealers: Prevention and Protection against Information Theft
Designed by Freepik

By Graciela Martínez

As part of our ongoing efforts to raise awareness among users and organizations in the region about Internet vulnerabilities and promote best cybersecurity practices, today we will be sharing information about infostealers. We have observed a rise in this type of cybersecurity threat, so we believe it is essential to alert and prepare the technical community.

Infostealers are one of the cyberthreats that can cause us the most damage, as they have the ability to steal our system access credentials, i.e., the username and password associated with an account.

What is an infostealer? Infostealers are a type of malware designed to collect access credentials for the purpose of exfiltrating sensitive information.

Their main goal is to gather access credentials to various systems, for example, those automatically saved in browsers, banking and financial information, personal identification numbers, and others. They can also collect information from web browsers, email clients, and other applications.

How do they work? Infostealers are spread through various means, primarily through phishing email messages (the most common method), malicious attachments, infected websites, software vulnerabilities, or pirated software, regardless of whether the device has active antivirus protection.

The stolen credentials are often sold on black markets or on social networks frequented by cybercriminals.

(Free access, no subscription required)

Top infostealers. According to the LACNIC CSIRT observatory, RedLine, Raccoon, and Lumma are the leading infostealer families in our region. In fact, RedLine accounts for almost 50% of all incidents.

The three malware families use various techniques to collect data from infected computers in order to steal access credentials and later sell them on the black market. The following image shows their distribution.

It should be noted that “Other” includes 14.6% of generic stealers, which are developed to steal a wide variety of data.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments