Rise in Infostealers via Phishing Sparks Cybersecurity Concerns

Article Highlights
Off On

The alarming spike in infostealer malware delivered through phishing emails has heightened cybersecurity concerns. In 2024, there was an 84% increase in the weekly delivery volume of these infostealers compared to the previous year. More strikingly, early readings from 2025 show an astounding 180% surge in comparison to 2023. This upward trend not only marks a significant uptick in malicious activity but also indicates a shift in attack methodologies, with hackers increasingly targeting user credentials over traditional backdoor malware.

Infostealers are a sophisticated type of malicious software designed to siphon sensitive data from compromised systems. They are capable of capturing keystrokes, taking screenshots, and extracting stored credentials from browsers, cryptocurrency wallets, and password managers. Once obtained, these credentials are utilized to launch further attacks, leading to account compromises and exploitation of public-facing applications, which emerged as the leading initial access vectors in 30% of security incidents throughout 2024.

Evolution of Attack Techniques

Traditional methods of delivering malicious attachments, such as using ZIP and RAR files, have seen significant declines. ZIP files experienced a 70% drop, while RAR files saw a 45% decrease. Instead, attackers have shifted their strategy to embedding malicious URLs within seemingly innocuous PDF documents and leveraging trusted cloud platforms to host malware. This evolution in tactics helps cybercriminals bypass many traditional security controls, making it more challenging for organizations to defend against such sophisticated intrusions.

IBM analysts have uncovered various prevalent infostealers disseminated through phishing emails, including well-known threats like AgentTesla, FormBook, SnakeKeylogger, and PureLogs Stealer. Additionally, there has been a 12% increase in infostealer listings on dark web forums, with Lumma being the most dominant, followed by RisePro, Vidar, Stealc, and RedLine. This surge underscores the lucrative and sustainable nature of credential harvesting operations, which, according to Charles Henderson, Head of IBM X-Force, were involved in 28% of all security incidents in 2024.

Sophisticated Obfuscation Techniques

A notable trend in the delivery of infostealers is the use of PDF documents. PDFs are universally trusted but possess complex structures that can effectively hide malicious code. An analysis of malicious PDFs revealed various obfuscation techniques: 42% utilized obfuscated URLs, 28% hid URLs in PDF streams, and 7% employed encrypted forms with passwords. These advanced techniques, such as encoding URLs using hexadecimal representation or JavaScript obfuscation, complicate detection efforts for automated scanning systems and increase the efficacy of these attacks.

These PDF-based threats have primarily targeted financial institutions in Latin America, distributing banking trojans like Grandoreiro, Mekotio, and Guildma through cloud-hosted infrastructure. The combination of intricate obfuscation techniques, trusted file formats, and the use of legitimate hosting platforms creates an ideal scenario for stealing credentials. To effectively counter these threats, organizations must adopt layered defenses, advanced endpoint protection solutions, and strong identity management controls that can adapt to these evolving practices.

Future Cybersecurity Strategies

In light of the growing threat posed by infostealer malware, organizations need to reevaluate their cybersecurity strategies. The traditional reliance on perimeter defenses and signature-based detection methods is no longer sufficient. Modern cybersecurity measures must incorporate advanced threat detection and response capabilities, such as machine learning and behavioral analysis, to identify and mitigate sophisticated attacks more effectively.

Employee training and awareness programs are also crucial, as phishing exploits heavily rely on social engineering tactics to deceive users into opening malicious attachments or clicking on harmful links. By equipping employees with the knowledge and skills to recognize and respond to phishing attempts, organizations can reduce the likelihood of successful attacks. Regular security assessments and penetration testing can help identify vulnerabilities and strengthen defenses against infostealers and other cyber threats.

Addressing the Human Element

While technology plays a vital role in defending against infostealer malware, addressing the human element in cybersecurity is equally critical. Cybersecurity culture within an organization can make or break its overall defense posture. Encouraging a culture where employees are vigilant and proactive about security can drastically reduce the potential for phishing attacks to succeed. Implementing robust policies around the handling of sensitive information and conducting regular training sessions on the latest phishing tactics can significantly bolster overall cybersecurity.

Moreover, organizations should foster an environment where employees feel comfortable reporting suspicious activities without fear of repercussions. By creating open channels of communication, potential threats can be identified and mitigated more swiftly. Facilitating collaboration between IT teams and employees ensures that security measures are not only enforced but also understood and respected by everyone within the organization.

Integrating Advanced Technologies

As infostealer tactics continue to evolve, integrating advanced technologies into cybersecurity frameworks becomes increasingly vital. Solutions leveraging artificial intelligence and machine learning can analyze vast amounts of data to detect anomalies and predict potential threats before they cause significant damage. These technologies can enhance traditional security tools, providing a more comprehensive defense against sophisticated phishing campaigns and infostealer attacks.

Furthermore, adopting a zero-trust architecture can minimize the risk of credential theft. By assuming that every network request, whether internal or external, is potentially malicious, organizations can enforce stricter access controls and continuously monitor user activities. This approach reduces the chances of stolen credentials being used to gain unauthorized access to critical systems and data.

Conclusion

The alarming rise in infostealer malware delivered via phishing emails has significantly increased cybersecurity concerns. In 2024, there was a staggering 84% increase in the weekly delivery volume of these infostealers compared to the previous year. More concerning, early data from 2025 shows an astounding 180% surge in comparison to 2023. This escalation not only signifies a sharp uptick in malicious activities but also highlights a shift in hackers’ methodologies, focusing more on stealing user credentials rather than using traditional backdoor malware.

Infostealers are highly sophisticated malicious software designed to extract sensitive data from compromised systems. They are adept at capturing keystrokes, taking screenshots, and retrieving stored credentials from browsers, cryptocurrency wallets, and password managers. Once obtained, these credentials are used to perpetrate further attacks, leading to account compromises and exploitation of public-facing applications. These applications became the primary initial access points in 30% of security incidents throughout 2024, highlighting their vulnerability. Cybersecurity measures must adapt to this evolving threat landscape.

Explore more

ServiceNow Transforms B2B Marketing with Human-Centric Approach

What if the often sterile and transactional realm of B2B marketing could captivate audiences with the same emotional pull as a viral consumer campaign? In an era where business decisions are made by people craving connection, ServiceNow, a titan in digital workflow solutions, is rewriting the rules. Under the visionary leadership of Chief Marketing Officer Colin Fleming, this company is

Why Are Prepaid Cards the Future of Payroll Management?

Welcome to an insightful conversation with Ling-Yi Tsai, a renowned HRTech expert with decades of experience in transforming organizational processes through innovative technology. With a deep focus on HR analytics and the seamless integration of tech solutions in recruitment, onboarding, and talent management, Ling-Yi has a unique perspective on how payroll systems are evolving to meet modern workforce needs. Today,

Can 5G Traffic Be Sniffed Without Rogue Base Stations?

Introduction Imagine stepping out of an elevator or turning off airplane mode after a long flight, unaware that in those fleeting moments, your 5G connection could be vulnerable to interception. As 5G networks become the backbone of global communication, ensuring their security is paramount, especially during the initial connection phases where data might be exposed. This pressing issue raises critical

Trend Analysis: Embedded Finance for Credit Access

Imagine scrolling through a favorite e-commerce app to buy a much-needed gadget, only to be offered an instant loan at checkout with just a few clicks—no bank visits, no lengthy paperwork. This seamless integration of financial services into everyday digital platforms is the essence of embedded finance, a transformative trend that is reshaping how credit is accessed in unexpected places

Embedded Finance: Driving Global Business Growth with Payments

What if the secret to skyrocketing business success in a hyper-connected world lies not in groundbreaking products, but in the invisible threads of financial transactions woven into every customer interaction? Picture a small online retailer in Texas effortlessly selling to customers in Tokyo, with payments processed instantly in yen, without ever touching a bank portal. This is the power of