Infostealer
Part of a series on |
Computer hacking |
---|
In
Infostealers usually consist of a bot framework that allows the attacker to configure the behaviour of the infostealer, and a management panel that takes the form of a server to which the infostealer sends data. Infostealers infiltrate devices through
Infostealers are usually distributed under the malware-
The number of stolen data logs being sold on the Russian Market, a cybercrime forum, has increased significantly since 2022. According to Kaspersky's research in mid-2023, 24% of malware offered as a service are infostealers. In February 2025, SparkCat, the first OCR infostealer, was discovered in the iOS App store.[1]
Overview
In
The bot framework includes a builder that allows the attacker to configure how the infostealer will behave on a user's computer and what kind of information it will steal. The management interface, usually written in traditional
Distribution and use
Infostealers are commonly distributed through the malware-as-a-service (MaaS) model, enabling individuals with varying technical knowledge to deploy these malicious programs. Under this model, three distinct groups typically emerge: developers, malware service providers, and operators. Developers, the most technically skilled, write the infostealer code. Malware service providers purchase licenses for the malware and offer it as a service to other cybercriminals. The operators, who can be developers or service providers themselves depending on their skill level, use these services to perform credential theft.[2]
Once the malware is purchased, it is spread to target victim machines using various
Credentials obtained from infostealer attacks are often distributed as logs or credential dumps, typically shared on paste sites like
Features
An infostealer's primary function is to exfiltrate sensitive information about the victim to an attacker's
In 2009, researchers at the
More recently, in 2020, researchers at the
The researchers also found that the data most frequently stolen using the AZORult infostealers and sold on the black market could be broadly categorised into three main types: fingerprints, cookies, and resources. Fingerprints consisted of identifiers that were constructed by probing a variety of features made available by the browser. These were not tied to a specific service but were considered to be an accurately unique identifier for a user's browsers. Cookies allowed buyers to hijack a victim's browser session by injecting it into a browser environment. Resources refer to browser-related files found on a user's operating system, such as password storage files.[18]
Economics and impact
Setting up an infostealer operation has become increasingly accessible due to the proliferation of stealer-as-a-service enterprises, significantly lowering financial and technical barriers. This makes it feasible for even less sophisticated cybercriminals to engage in such activities.
Due to their extreme profitability and accessibility, the number of cybersecurity incidents that involve infostealers has risen.[7] The COVID-19 post-pandemic shift towards remote and hybrid work, where companies give employees access to enterprise services on their home machines, has also been cited as one of the reasons behind the increase in the effectiveness of infostealers.[7][21] In 2023, research by Secureworks discovered that the number of infostealer logs—data exfiltrated from each computer—being sold on the Russian market, the biggest underground market, increased from 2 million to 5 million logs from June 2022 to February 2023.[21] According to Kaspersky's research in mid-2023, 24% of malware offered as a service are infostealers.[22]
References
Citations
- ^ "SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images". The Hacker News. Retrieved 2025-03-22.
- ^ a b c Avgetidis et al. 2023, pp. 5308
- ^ a b c d e Avgetidis et al. 2023, pp. 5308–5309
- ^ Avgetidis et al. 2023, pp. 5314, 5319
- ^ a b Nurmi, Niemelä & Brumley 2023, p. 1
- ^ Ryan 2021, p. 76
- ^ a b c d Newman 2024
- ^ Nurmi, Niemelä & Brumley 2023, p. 2
- ^ Nurmi, Niemelä & Brumley 2023, p. 6
- ^ Nurmi, Niemelä & Brumley 2023, p. 7
- ^ a b Nurmi, Niemelä & Brumley 2023, p. 8
- ^ Muncaster 2023
- ^ a b Onaolapo, Mariconti & Stringhini 2016, p. 65,70,76
- ^ a b Bursztein et al. 2014, p. 353
- ^ a b Campobasso & Allodi 2020, pp. 1669
- ^ Grammatikakis et al. 2021, pp. 121
- ^ Nicolas & Chien 2009, pp. 3–4
- ^ Campobasso & Allodi 2020, pp. 1669–1670
- ^ Avgetidis et al. 2023, p. 5309
- ^ Avgetidis et al. 2023, p. 5318
- ^ a b Hendery 2023
- ^ Lyons 2024
Sources
- Avgetidis, Athanasios; Alrawi, Omar; Valakuzhy, Kevin; Lever, Charles; Burbage, Paul; Keromytis, Angelos D.; Monrose, Fabian; Antonakakis, Manos (2023). "Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators". USENIX Security: 5307–5324. ISBN 978-1-939133-37-3.
- Bursztein, Elie; Benko, Borbala; Margolis, Daniel; Pietraszek, Tadek; Archer, Andy; Aquino, Allan; Pitsillidis, Andreas; Savage, Stefan (2014-11-05). "Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild". Proceedings of the 2014 Conference on Internet Measurement Conference. ACM. pp. 347–358. ISBN 978-1-4503-3213-2.
- Campobasso, Michele; Allodi, Luca (2020-10-30). "Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale". Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM. pp. 1665–1680. ISBN 978-1-4503-7089-9.
- Grammatikakis, Konstantinos P.; Koufos, Ioannis; Kolokotronis, Nicholas; Vassilakis, Costas; Shiaeles, Stavros (2021-07-26). "Understanding and Mitigating Banking Trojans: From Zeus to Emotet". 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE. pp. 121–128. ISBN 978-1-6654-0285-9.
- Hendery, Simon (2023-05-17). "Data log thefts explode as infostealers gain popularity with cybercriminals". SC Magazine. Archivedfrom the original on 2023-10-17. Retrieved 2024-07-18.
- Lyons, Jessica (29 February 2024). "Ransomware gangs are paying attention to infostealers, so why aren't you?". The Register. Archived from the original on 11 September 2024. Retrieved 17 August 2024.
- Muncaster, Phil (2023-02-09). "New Info-Stealer Discovered as Russia Prepares for New Offensive". Infosecurity Magazine. Archived from the original on 2024-09-11. Retrieved 2024-08-13.
- Newman, Lily Hay (29 July 2024). "How Infostealers Pillaged the World's Passwords". Wired. from the original on 2024-08-13. Retrieved 2024-08-13.
- Nicolas, Falliere; Chien, Eric (2009). "Zeus: King of the Bots" (PDF). Symantec. Archived from the original (PDF) on 2017-01-10.
- Nurmi, Juha; Niemelä, Mikko; Brumley, Billy Bob (2023-08-29). "Malware Finances and Operations: A Data-Driven Study of the Value Chain for Infections and Compromised Access". Proceedings of the 18th International Conference on Availability, Reliability and Security. ACM. pp. 1–12. ISBN 979-8-4007-0772-8.
- Onaolapo, Jeremiah; Mariconti, Enrico; Stringhini, Gianluca (2016-11-14). "What Happens After You Are PWND: Understanding the Use of Leaked Webmail Credentials in the Wild". Proceedings of the 2016 Internet Measurement Conference. ACM. pp. 65–79. ISBN 978-1-4503-4526-2.
- Ryan, Matthew (2021), Ryan, Matthew (ed.), "Ransomware Case Studies", Ransomware Revolution: The Rise of a Prodigious Cyber Threat, Advances in Information Security, vol. 85, Cham: Springer International Publishing, pp. 65–91, ISBN 978-3-030-66583-8, retrieved 2024-08-13