Skip to content

Cybersecurity Alert: Infostealers Affect 4.3M Machines in 2024

Infostealers stole credentials from 4.3 million machines in 2024. The threat persists due to the malware-as-a-service model.

In this image, we can see an advertisement contains robots and some text.
In this image, we can see an advertisement contains robots and some text.

Cybersecurity Alert: Infostealers Affect 4.3M Machines in 2024

Cybersecurity experts are warning of a surge in infostealer activity, with over 4.3 million machines affected in 2024. Compromised credentials, providing access to sensitive corporate services, are a significant concern. International agencies have disrupted operations, but the threat persists due to the malware-as-a-service model.

Infostealers, which steal sensitive data such as passwords and cookies, were one of the most significant initial access vectors in 2024. They affected a staggering 4.3 million machines, with 330 million compromised credentials linked to their activity. The top three strains - Lumma, StealC, and RedLine - were responsible for over 75% of infected machines. In one instance, infostealers were behind the hijacking of multiple Snowflake accounts, impacting over one billion customers of companies including Ticketmaster and AT&T.

The increase in infostealer activity is attributed to the malware-as-a-service model, which allows cybercriminals to rent malicious code, increasing its sophistication and reach. Kela, a leading cybersecurity firm, predicts a continued surge in infostealer activity. In 2024 alone, over 3.9 billion credentials were shared in the form of credentials lists, mostly obtained from infostealer logs.

The threat of infostealers is real and growing. With over 4.3 million machines affected in 2024, and compromised credentials providing access to sensitive corporate services, businesses and individuals must remain vigilant. Regular software updates, strong passwords, and multi-factor authentication are essential to protect against these threats. As infostealers continue to evolve, so too must our cybersecurity measures.

Read also:

Latest