Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

The 5 Robotics Trends In 2026 You Must Get Ready For Now

October 20, 2025

Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

October 20, 2025

NYT Mini Crossword Clues And Answers — Sunday, October 19

October 19, 2025
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » Unraveling The Infostealer Threat
Innovation

Unraveling The Infostealer Threat

adminBy adminOctober 11, 20230 ViewsNo Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Mike Wilson is the Founder & CTO of Enzoic, a cybersecurity company that helps prevent account takeover of employee and customer accounts.

Malware is a growing threat to organizations and individuals. One increasingly popular variant is information-stealing malware (infostealers), which is malicious software designed to steal data.

Unlike ransomware, where information is held hostage, infostealer attacks happen covertly, and the growth has been driven by the explosion in connected devices coupled with the ease of trading information on the dark web. To provide perspective on the magnitude of the problem, research by Secureworks found that the volume of credentials for sale on the dark web from infostealers grew 150% between June 2022 and February 2023.

Infostealers 101

Infostealers is a type of malware as a service (MaaS) that extracts data from infected devices. The information is then sold and published as logs on the dark web.

The MaaS model has lowered the barrier to entry and driven up the risk, with research by Kaspersky finding that 24% of malware sold as a service is now infostealers. Bad actors lease malicious software from the dark web to carry out cyberattacks. Once installed, it stealthily gathers data such as usernames, passwords, dates of birth, home addresses, bank account numbers, credit card information, cellphone numbers, cookies and session IDs.

Infostealers allow criminals of limited means and technical knowledge to deploy the software and start accessing networks. The August 2023 Blackberry Global Threat Intelligence Report highlighted that healthcare and financial services are the most targeted sectors with infostealers.

Infostealers Sources

Infostealers can be extremely challenging to prevent for numerous reasons, including the fact that they often originate via the following avenues:

• Supply chain attacks. Bad actors intentionally target less secure elements in the supply chain and install infostealers malware to obtain access to more sensitive systems and files. Once a system is infected with the malicious software, it can then easily access any corporate resources on the network such as VPNs, internal websites or corporate accounts.

• Fileless attacks. Another issue is that infostealers often take the form of fileless malware. These attacks use native, legitimate tools to infiltrate—unlike traditional malware that requires threat actors to install code on an enterprise system. Because nothing is written, it’s much more difficult for traditional endpoint security solutions to detect.

Threat Mitigation Solutions

What can enterprises do to defend against the growing threat?

Modern endpoint detection and response (EDR) and anti-malware tools are evolving to try to protect against infostealers, along with new anti-malware capabilities and other threat mitigation strategies.

Let’s examine the various options and why they can’t effectively combat the threat.

EDR

These solutions provide intelligence on threats and how they spread across the network. EDR products analyze telemetry from endpoints to obtain information that security teams can use to understand how an attack occurred, how future threats might materialize and what the organization can do to prevent those attacks. In addition, administrators can isolate endpoints under attack to prevent it from spreading.

However, there are several weaknesses with this technology, including:

• Additional burden on security teams. EDR requires a lot of manual input from security teams, many of whom are already struggling with the volume of work.

• False positives. EDR solutions do not delete suspected malware but simply capture the files they perceive as threats, which can cause spurious results.

• Significant training. Teams must be trained to accurately separate genuine threats from false positives, which can be a taxing imperative for busy security teams that are understaffed and undertrained.

Anti-Malware

Anti-malware software typically deploys signature-based malware detection, behavior-based malware detection or sandboxing to identify malicious software and prevent networks from being infected.

However, it has weaknesses of its own:

• System slowdown. These programs can negatively impact system speed and also cause network lags.

• No zero-day protection. Anti-malware cannot prevent zero-day attacks. This is a seismic weakness in the fight against infostealers. In 2022, the RedLine infostealer exploited a zero-day vulnerability to steal data from global brands.

In addition, EDR and anti-malware fail to address basic password vulnerabilities. With reuse still pervasive, tackling the credential problem is a central component of combatting infostealers. Adding another layer to screen credentials is vital to address the weaknesses with EDR and anti-malware options.

Threat Intelligence Is Vital

Early detection is essential, as any delay in identifying infostealers may result in the compromise of important accounts and, from there, the exposure of sensitive data. To help mitigate the risk, organizations need threat intelligence to ensure that if sensitive information or credentials are exposed in third-party breaches or infostealers logs, they can take quick action to prevent a breach.

Companies must integrate a proactive threat intelligence solution to mitigate the risks. To select the right solution, they should talk to industry analysts to get unbiased advice. However, don’t just consult legacy companies; connect with independents focused on cybersecurity—particularly those with a white hat hacker on staff. While this may seem time-consuming, it avoids potential problems further down the line.

In addition to seeking advice, organizations should take the following steps:

• Bring your own device (BYOD). Tighten policies to restrict devices that don’t meet company standards and have unsafe apps installed (such as gaming or dating sites) that are often infostealer entry points. This reduces the risk of infostealer malware from a personal site that could expose the corporate data contained on the device.

• Training. Regular internal training on the threat landscape is essential to keep employees aware of the latest tactics. For example, they need to understand how to identify a fake website from a legitimate one.

• Software updates. Ensure malware and antivirus software are up to date, and prevent users from accessing the company network until this is done.

Infostealers: Here To Stay

With infostealers continuing to flourish, companies can’t bury their head in the sand and hope they won’t be impacted. An example of the volatility is the Racoon Infostealer, which was shut down in 2022 and resurfaced in the summer of 2023 on the dark web with improved functionality. Organizations must remain vigilant and modernize their security strategies to enhance and strengthen their defenses against the ever-changing cyber threat landscape.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

The 5 Robotics Trends In 2026 You Must Get Ready For Now

Innovation October 20, 2025

NYT Mini Crossword Clues And Answers — Sunday, October 19

Innovation October 19, 2025

Microsoft Confirms Emergency Update For Millions Of Windows Users

Innovation October 18, 2025

Nvidia Packs Data Center AI Into A Desktop Box

Innovation October 17, 2025

‘NYT Mini’ Hints And Answers For Thursday, October 16

Innovation October 16, 2025

‘NYT Mini’ Hints And Answers For Wednesday, October 15

Innovation October 15, 2025
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

The 5 Robotics Trends In 2026 You Must Get Ready For Now

October 20, 2025

Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire

October 20, 2025

NYT Mini Crossword Clues And Answers — Sunday, October 19

October 19, 2025

A Plan to Rebuild Gaza Lists Nearly 30 Companies. Many Say They’re Not Involved

October 19, 2025

Microsoft Confirms Emergency Update For Millions Of Windows Users

October 18, 2025

Latest Posts

Nvidia Packs Data Center AI Into A Desktop Box

October 17, 2025

‘Sovereign AI’ Has Become a New Front in the US-China Tech War

October 17, 2025

‘NYT Mini’ Hints And Answers For Thursday, October 16

October 16, 2025

‘NYT Mini’ Hints And Answers For Wednesday, October 15

October 15, 2025

Inside Intel’s Hail Mary to Reclaim Chip Dominance

October 15, 2025
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2025 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT