Infostealers: The Silent Threat Compromising the World One Password at a Time

Explore how infostealers compromise global security, silently stealing data and offering adversaries Initial Access to networks.
advisory Infostealers feature image

Table of Contents

What Are Infostealers?

Infostealers are a class of malicious software designed to collect and exfiltrate data from systems or networks without user consent. These stealth programs, often driven by financial or criminal motives, aim to exfiltrate sensitive information, posing significant risks to both individuals and organizations.

The first observed modern infostealer dates back to early 2007 and was known as ZeuS or Zbot. The main objective of the malware was to steal online banking credentials and quickly became one of the most widespread and sophisticated banking trojans ever seen. In 2011, the source code was publicly released, leading to the proliferation of numerous new variants.

Over the years, technological advancements and the underground economy have facilitated the development and proliferation of new infostealer variants, with cybercriminals continuously improving their tactics to evade detection and maximize profits. Today, infostealers remain a prevalent and potent threat, posing serious risks to individuals, businesses, and organizations worldwide. 

Increasingly, infostealers are being used as an entry point in sophisticated cyber attacks, underscoring their role as a fundamental threat vector in modern cybercrime.

How Do Infostealers Work?

The main function of an infostealer is to clandestinely collect sensitive information from victims through various techniques such as enumerating files and directories, logging keystrokes, extracting browser data, accessing files, copying cookies and taking screenshots. The stolen data is then transmitted to a command and control server controlled by the attacker.

As is common with modern malware, infostealers have transitioned to a Malware as a Service (MaaS) model. This facilitates attackers with minimal expertise in targeting companies by utilizing such services to infiltrate systems and extract information, often in the format of logs. Subsequently, these logs are sold on underground forums and criminal marketplaces on the dark web.

Data most frequently targeted by infostealers:

  • System Configuration information
  • Account credentials
  • Browser data such as cookies and extension data
  • Credit cards
  • Crypto wallets
  • Autofill information

Infostealers are distributed over several channels including phishing, spread phishing, and malvertising. Additionally, uncommon distribution methods include SEO Poisoning, fake software, and public social network posts. 

Common Distribution Channels

Phishing: This is a common method of distributing several malware families, usually cybercriminals send documents such as PDFs, HTML files, or those from MS Office containing malicious payloads or camouflaged URL links to download the artifacts. To try to evade detection, files are often encrypted with passwords, rendering it challenging for email providers to scan for malicious content.

Legitimate software instrumentation: This is a classic infection vector, users can be easily infected when installing illegitimate software. Modified versions often harbor embedded malicious code, making them a significant risk to inexperienced users.

Malversiting: This trend started while back in 2017 and is currently on a surge, malicious actors distribute malicious payloads through some high-rank pages, oftentimes impersonating updates for popular software, like Google Chrome. 

The Infrastructure Behind an Infostealer Botnet

The following is the topology of Redline Stealer, a typical modern infostealer.

Analyzing Stolen Information

The information collected by infostealers is focused on specific objectives. On one hand, it aims to acquire sensitive data like banking portal credentials, cryptocurrency wallets, email account details, social media credentials or any information that could be exploited for future misuse. On the other hand, infostealers also gather technical details about the compromised system, including session cookies, UserAgents, machine specifications, and log files. These technical insights allow attackers to simulate the environment of targeted accounts, evading security measures and attempting unauthorized access without environmental restrictions.

Below is an example of information stolen by a real MaaS infostealer.

Most infostealers possess the capability to identify multiple login portals and extract credentials. After it, they format this information into structured logs, employing various techniques to transmit them to adversarial infrastructure (exfiltration). This allows attackers to easily access and exploit sensitive information collected from compromised systems.

Stats from the Dark World

Source: Hudson Rock

Infostealers and the Cybercrime Economy

Behind information theft lies an intricate cybercriminal ecosystem with diverse roles and profit levels. Researchers from SecureWorks identify at least four tiers: 

Developers and Information Experts: Tasked with creating programs to steal data while evading cybersecurity measures. This level thrives on market demand for specific features tailored to targets. 

Criminal Marketplaces: The second tier, also known as Initial Access Brokers (IABs), operates on dark web forums, offering services and access ranging from $50 to $1000 USD, depending on the infostealer type. Customers, typically malicious actors leveraging industry-specific knowledge, utilize this Initial Access for sophisticated attacks like ransomware. The rise of Ransomware as a Service (RaaS) has heightened the importance of IABs, streamlining intelligence gathering and reconnaissance, enabling attackers to initiate attacks with a solid initial vector.

Dark Support Infrastructure: These offshore support services are dedicated to maintaining anonymity for cybercriminals. In the latest Models as a Service (MaaS), this infrastructure is managed by the owners of the malware services themselves.

Victims: Ultimately, victims of such attacks, under pressure from various factors, succumb to paying ransom to criminal gangs. This payment is made to prevent the publication of sensitive data or decrypt crucial information essential for business continuity. Unwittingly, these actions contribute to the perpetuation of the criminal economic cycle.

There are several forums that sell information on the dark web, like 2easy, BidenCash and Russian Market. There is also a recent trend to sell that information on decentralized stores and social media platforms like Telegram and others. 

BidenCash Market

Telegram BerkserkLogs Market

Several Threat Actors have been seen using Initial Access Brokers to compromise networks and perform large scale attacks, like Lockbit 3.0, Royal Ransomware, BlackHunt, Medusa, and others.  

Has Your Network Been Compromised by InfoStealers?

Threat actors constantly scan the internet for fresh targets. The more information they possess about a company, the greater their possibility to infiltrate the infrastructure. Weak security measures to decrease the attack surface, enabling attackers to identify and exploit vulnerabilities effortlessly. Moreover, the ease of acquiring credentials or access to environments facilitates illicit activities, allowing malicious actors to operate easily.

At present, several companies remain unaware that multiple of their employee credentials are being sold on the dark web. Quietly, attackers hold the key to initiating large-scale attacks. 

Observe Your Network Activity

Lumu’s Continuous Compromise Assessment allows you to identify when, where, and how your infrastructure is communicating with adversaries, you gain the visibility you need of what is happening anytime in your network. The robust process of cyber threat intelligence provides you with crucial information to safeguard your infrastructure and effectively mitigate threats across multiple stages of the infection chain.

Lumu tracks malicious infrastructure that distributes, communicates or controls malware, phishing, spam, malvertising and different types of threats and techniques, and alerts your company when the enemy comes knocking.

Mitre Map of Infostealer Malware

Tactic

Technique

Reconnaissance

T1589 Gather Victim Identity Information

Reconnaissance

T1598 Phishing for information

Resource Development

T1583.001 Acquire Infraestructure: Domains

Resource Development

T1585.001 Establish Accounts: Social Media Accounts

Initial Access

T1566: Phishing

Initial Access

T1204.002: Malicious File

Initial Access

T1189 Drive-by Compromise

Initial Access

T1199: Trusted Relationship

Initial Access

T1078.002 Valid Accounts: Domain Accounts

Execution

T1059.003: Windows Command Shell

Execution

T1059.001: PowerShell

Execution

T1648 Serverless execution

Execution

T1204 User execution

persistence

T1136 Create account

Privilege escalation

T1484.002 Domain Policy modification

Defense Evasion

T1564.001: Hidden Files and Directories

Defense Evasion

T1070.004 Indicator Removal File Deletion

Defense Evasion

T1578.002 Modify Cloud Compute Infraestructure

Defense Evasion

T1497.001 System Checks

Credential Access

T1555.003: Credentials from Web Browsers

Credential Access

T1555 Indicator RemovalFile Deletion

Credential Access

T1606 Forge Web Credentials

Credential Access

T1621 Multi-Factor Authentication Request Generation

Credential Access

T1552 Unsecure Credentials: Credentials in files

Discovery

T1087: Account Discovery

Discovery

T1217: Browser Information Discovery

Discovery

T1046: Network Service Discovery

Discovery

T1057: Process Discovery

Discovery

T1012: Query Registry

Discovery

T1518: Software Discovery

Discovery

T1016: System Network Configuration Discovery

Discovery

T1614: System Location Discovery: System Language Discovery

Discovery

T1083: File and Directory Discovery

Discovery

T1082: System Information Discovery

Discovery

T1033: System Owner/User Discovery

Discovery

T1538: Cloud Service Dashboard.

Discovery

T1018: Remote System Discovery

Discovery

T1539: Steal web session cookie

Collection

T1113: Screen Capture

Collection

T1119: Automated Collection

Collection

T1115: Clipboard Data

Collection

T1005: Data from Local System

Collection

T1056.001: Keylogging

Command & Control

T1102: Web Service

Command & Control

T1102.002: Bidirectional Communication

Exfiltration

T1041: Exfiltration Over Command-and-Control Channel

Exfiltration

T1020: Automated Exfiltration

Exfiltration

T1048: Exfiltration Over Alternative Protocol

Adopt Strategies to Minimize Your Attack Surface

This silent adversary takes advantage of any inadvertent information divulged by companies. Every service that companies expose to the internet must undergo risk analysis. Companies need to adopt strategies to assess their exposed infrastructure and determine its necessity in terms of business operations. Access should be restricted using methods of least privilege in their networks and authentication systems.

The adversary will try to communicate with your infrastructure and you must be prepared to detect it.

Check Your Devices

It’s crucial to have monitoring tools in place to keep track of your device services, detecting any suspicious behavior promptly. If your company has an EDR, it is essential to maintain it up-to-date.

Protecting Against Infostealers

Cybersecurity operators looking to protect against the threat posed by infostealers can take the following actions:

  • Establish an effective strategy for the continuous monitoring of network and endpoint activity to detect any suspicious activity. 
  • Make sure that any communication between your network and adversarial infrastructure is being blocked. With Lumu’s 125+ integrations, any detected contacts are immediately blocked using existing cybersecurity infrastructure.
  • Enforce the principle of least privilege to ensure that users have access to services and permissions for their job functions and no more.
  • Do not expose unnecessary services. Users are advised to disable their Remote Desktop Protocols (RDPs) if not in use, if required, it should be placed behind the firewall and users are to bind with proper policies while using an RDP.
  • Get to know if there are compromised credentials. 
  • Familiarize employees with a proper procedure for opening digital documents.
  • Tune your spam defenses.
  • Establish a Sender Policy Framework (SPF) for your domain.

Conclusion

The stealth and sophistication of infostealer malware present a clear and present danger to global cybersecurity. Originally designed for data theft, infostealers now provide cyber adversaries with a potent tool for Initial Access, thereby setting the stage for more devastating attacks. Organizations must prioritize the detection and mitigation of infostealers as part of a comprehensive cybersecurity strategy. By remaining vigilant, continuously monitoring for suspicious activity, and employing advanced threat detection and response mechanisms, we can significantly reduce the risk posed by these silent threats.

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Share this post

RELATED POSTS

EDR evasion feature image
Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers evade Endpoint Detection and Response (EDR) systems using various techniques. Learn about the common tactics used by cyber attackers to bypass endpoint defenses and how to better protect against these stealthy attacks.

Join our pre-day 
workshop waitlist

  • By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.