The threat from Malware continues to escalate with infostealers, an increasingly popular variant.
Research found that 24% of malware is now infostealers, and it's now one of the most popular topics on the cybercriminal underground.
The malicious software allows cyber criminals of limited means and technical knowledge to deploy it and start accessing networks and stealing data.
Infostealers is a type of malware-as-a-service that extracts data from infected devices.
Unlike ransomware, where information is held hostage, these attacks happen covertly, and the growth has been driven by the explosion in connected devices coupled with the ease of trading information on Dark Web sites.
Once installed, the infostealer stealthily gathers data, including usernames, passwords, date of birth, home address, bank account numbers, credit card information, cell number, cookies and session IDs.
The information is then sold and published as logs on the Dark Web.
An employee might download infostealer malware via a gaming site that would then expose all of the corporate data contained on the device.
This is partly why infostealers are so difficult to prevent because they exploit the weakest link in cybersecurity - human behavior.
The malware can exploit vulnerabilities in these solutions, gaining access to all saved credentials and monitoring and stealing new ones as they are entered.
Password managers link the URL where the respective credential is used, so infostealers expose the credential in not only plain text but also all of the websites and services associated with it.
The pervasive problem of password reuse means that if a manager is used for personal accounts, it's very likely that the credentials are shared with work accounts.
When it comes to infostealers, multi-factor authentication is far from a failsafe.
These cookies can then be stolen by the infostealer and reused by threat actors, thereby rendering MFA ineffective.
With infostealers, organizations must remain vigilant and modernize their security strategies to enhance and strengthen their defenses against the ever-changing cyber threat landscape.
With the risks from the malicious software showing no sign of slowing, it's essential that companies integrate a proactive threat intelligence solution to strengthen their security posture.
This will help mitigate the risks and ensure that if sensitive information or credentials are exposed in third-party breaches or infostealers logs, they can take quick action to prevent a breach.
Enzoic offers a proprietary Dark Web monitoring solution that combines its dynamic threat database with extensive Dark Web research capabilities.
Enzoic's solutions combine the most comprehensive, complete, and actionable threat research data with automated remediation to help every enterprise strengthen its security posture.
Critically, through its proprietary Dark Web monitoring capabilities, Enzoic can collect infostealers logs as soon as they are posted, allowing companies to stay a step ahead of threat actors.
This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Thu, 07 Dec 2023 14:43:05 +0000