No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

3 Strategies to Defend Against Resurging Infostealers

September 8, 2023
in Protection
0
informa


Most enterprise chief information security officers (CISOs) are very familiar with infostealers, a pervasive breed of malware that quietly gathers website credentials, passwords, and other financial information from a compromised user account. Infostealers are nothing new; they have been a common tool in the threat actor’s toolbox since 2006, when the Zeus online banking Trojan was first spotted in the wild.

However, new research by the Uptycs research team has uncovered a stark increase in the distribution of infostealer malware over the past year. The study, “Stealers Are Organization Killers,” details a variety of new infostealers preying on Windows, Linux, and macOS systems. It shows that incidents more than doubled in the first quarter of 2023 compared with the same time last year.

Source: Uptycs

But it’s not just the growth in the volume of infostealers that’s raising eyebrows among threat researchers and security analysts. More concerning is how criminal organizations are finding novel ways to customize, market, and deploy infostealer malware at an unprecedented scale.

The Rapidly Evolving Infostealer Market

Initially designed as simple, single-purpose malware, infostealers have become sophisticated tool sets with advanced evasion techniques and modular architecture. Some operators even use generative artificial intelligence (AI) to mimic human-like behaviors.

This transformation has been fueled not only by criminal groups’ relentless pursuit to infiltrate more systems but also by the emergence of new Web platforms that facilitate creating and deploying infostealers.

Building and deploying an infostealer once required basic coding and IT operations skills. These days, anyone with a laptop and as little as $50 in their bank account can kickstart their own malicious campaigns by signing up for a malware-as-a-service offering that can be found on any number of Dark Web forums.

Encrypted communications platforms like Telegram and Discord have become the favored emporium for operators and buyers. These platforms have also become popular vehicles for buying and selling pilfered data. Their intuitive interfaces and end-to-end encryption make them attractive to operations security-minded cybercriminals, infostealer gangs, and newcomers. Stolen logs are often advertised and traded in private channels or groups, with a growing volume of transactions occurring directly within the platforms.

Three Strategies to Mitigate Infostealer Threats

If these trends continue, there’s little doubt that the infostealer market — and the operators’ sophistication — will grow in scale and scope. CISOs should consider adopting the following three strategies to mitigate this growing threat:

  1. Prioritize real-time detection: While vulnerability assessments are crucial for identifying weaknesses an attacker might exploit, they’re inherently reactive and do little to prevent malware operators from leveraging user credentials to bypass hardened authentication systems. By adopting a comprehensive extended detection and response (XDR) approach, CISOs can streamline telemetry data collection to gain a unified view across networks, endpoints, servers, and cloud workloads. This type of integrated approach is critical for accelerating the threat detection and response process, enabling security teams to proactively and quickly address infostealer and related emerging threats.
  2. Enforce strict access controls: Infostealers typically target data including personally identifiable information (PII), financial information, login credentials, and proprietary business data. Establishing governance over your entire infrastructure starts by properly segregating your networks so that sensitive data won’t be inadvertently exposed. Security leaders should prioritize protecting these data categories and implement stronger safeguards where gaps exist. Encrypt sensitive data at rest and in transit to make the information unreadable to unauthorized users.
  3. Understand the context of potential vulnerabilities: Like other cyber threats, infostealer attacks are continuously evolving as malware operators test and refine their techniques and tactics. By understanding the broader context of an infostealer attack, such as the data most likely to be targeted or the most actively exploited vulnerabilities, security teams can better predict and prioritize potential vulnerabilities to mount a fast and effective response. Having a contextual understanding of existing vulnerabilities is also essential for proactive threat hunting, which can help guide the search and shrink the time to remediation.

A Step Ahead

The battle against infostealers is yet another example of the ongoing cycle of adaptation and counter-adaptation between threat actors and security teams. As we’ve seen before, staying one step ahead of malware operators will require a comprehensive strategy that encompasses advanced technology, constant vigilance, proactive threat hunting, and ongoing education.

Editorial Team

Editorial Team

Related Posts

The LG UltraGear 39GX90SA-W Gaming Monitor Is $850 Off Right Now
Protection

The LG UltraGear 39GX90SA-W Gaming Monitor Is $850 Off Right Now

May 16, 2026
You Can Now Pre-Order XReal's R1 Gaming AR Glasses (With the ROG Control Deck)
Protection

You Can Now Pre-Order XReal’s R1 Gaming AR Glasses (With the ROG Control Deck)

May 15, 2026
10 Hacks Every Microsoft Teams User Should Know
Protection

10 Hacks Every Microsoft Teams User Should Know

May 15, 2026
I Tried These Four Fitness Watches to See Which Was Best for Hyrox Training
Protection

I Tried These Four Fitness Watches to See Which Was Best for Hyrox Training

May 15, 2026
Chatbots May Be Giving Out Your Phone Number
Protection

Chatbots May Be Giving Out Your Phone Number

May 15, 2026
Here Are the Best Early Memorial Day Sales so Far
Protection

Here Are the Best Early Memorial Day Sales so Far

May 15, 2026
Load More
Next Post
Elon Musk gave biographer top Ukrainian official’s confidential messages without permission

Elon Musk gave biographer top Ukrainian official’s confidential messages without permission

Popular News

  • How to Hire an Accountant

    How to Hire an Accountant

    0 shares
    Share 0 Tweet 0
  • Analyst Report: AbbVie Inc

    0 shares
    Share 0 Tweet 0
  • Airbus forms joint venture in bid to replace International Space Station

    0 shares
    Share 0 Tweet 0
  • What cybersecurity pros can learn from first responders

    0 shares
    Share 0 Tweet 0
  • Cricket star Adam Hollioake reveals how he lost £21million but fought his way back from bankruptcy

    0 shares
    Share 0 Tweet 0

Latest News

Iran Launches Bitcoin Payment Platform For Strait Of Hormuz Insurance

Iran Launches Bitcoin Payment Platform For Strait Of Hormuz

May 18, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Iran has launched a new maritime insurance...

Conservatives win election in Spain’s Andalusia, but need far right to govern

Conservatives win election in Spain’s Andalusia, but need far right to govern

May 18, 2026
0

Conservatives win election in Spain’s Andalusia, but need far right to govern

Senate Crypto Bill Might Pass as Late as August: NYDIG

Senate Crypto Bill Might Pass as Late as August: NYDIG

May 18, 2026
0

The US Senate’s crypto market structure bill could take until August to pass and risks not advancing at all if...

Aave restores WETH borrowing as Kelp DAO recovery moves ahead - 1

Aave restores WETH borrowing as Kelp DAO recovery moves ahead

May 18, 2026
0

Aave has restored borrowing against wrapped Ether across affected markets as the decentralized lending protocol continues recovering from the fallout...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.