
We noticed an increase in infostealer malware in 2024, with hackers utilizing it to steal credentials, cryptocurrency and different private information from tens of millions of customers. Should you recall, I reported numerous incidents of an infostealer referred to as Lumma preying on Android, Home windows and even iOS and Mac customers.
A brand new cybersecurity report now highlights that hackers utilizing Lumma, together with StealC, Redline and different infostealers, contaminated 4.3 million machines in 2024, resulting in an astonishing 330 million compromised credentials.Â
Safety researchers have additionally noticed 3.9 billion credentials shared in credential lists that seem like sourced from infostealer logs.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)
Infostealer-related assaults on the rise in 2024
AÂ cybersecurity report by risk intelligence platform KELA has uncovered a pointy rise in infostealer malware in 2024. Researchers additionally noticed an alarming development in how stolen information was circulated. Giant compilations of credentials, sometimes called “credential lists,” had been being shared throughout cybercrime boards. These lists, primarily sourced from infostealer logs, contained billions of login particulars harvested from contaminated units.
Probably the most notable incidents linked to infostealer malware was the breach of Snowflake, a cloud information storage supplier. In April 2024, risk actors gained entry to buyer accounts utilizing stolen login credentials, a lot of which had been obtained by infostealers. Exploiting weak safety practices, such because the absence of multifactor authentication, attackers extracted worthwhile information and later tried to promote it on underground markets. The breach affected not less than 165 firms.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The KELA report highlights that hackers deploying Lumma, StealC, Redline and different infostealers contaminated 4.3 million machines, resulting in the compromise of 330 million credentials. Almost 40% of those contaminated machines contained credentials for company techniques, together with content material administration platforms, e mail accounts, Lively Listing Federation Companies and distant desktop environments. In whole, this accounted for 1.7 million compromised bots and seven.5 million stolen credentials.
The report additionally discovered that 3.9 billion credentials had been shared in credential lists that seem like sourced from infostealer logs. KELA’s evaluation suggests that nearly 65% of contaminated units had been private computer systems storing company credentials, making them a first-rate goal for infostealer malware.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNETÂ
2025 just isn’t going to be any totally different
Infostealer malware just isn’t going wherever in 2025. With malware-as-a-service platforms on the rise and infostealers turning into extra superior, cybercriminals will probably preserve utilizing them as a go-to methodology for stealing credentials and getting access to techniques.
Regulation enforcement has been cracking down, although. In 2024, authorities managed to take down key elements of the infostealer ecosystem, together with disrupting Redline, one of the vital extensively used infostealers. This confirmed that worldwide companies can go after not simply the malware builders but additionally the networks and underground markets that preserve these operations operating.
However takedowns like these not often put an finish to the issue. When one main infostealer operation is shut down, others rapidly step in to take its place. The fixed demand for stolen credentials and the power of cybercriminals to adapt means infostealer assaults will probably stay a serious risk in 2025.
GET FOX BUSINESS ON THE GO BY CLICKING HERE

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
Methods to remain secure from infostealer malware
With infostealer malware turning into a rising risk, defending your information requires a mixture of good safety habits and dependable instruments. Listed below are some efficient methods to maintain your info secure.
1. Allow two-factor authentication (2FA): Even when your credentials are stolen, 2FA provides an additional layer of safety by requiring a second type of verification, corresponding to a code from an authentication app or biometric affirmation. Cybercriminals depend on stolen usernames and passwords to interrupt into accounts, however with 2FA enabled, they can not achieve entry with out the extra safety step. Be sure to allow 2FA on vital accounts like e mail, banking and work-related logins.
2. Use robust antivirus software program and be cautious with downloads and hyperlinks: Infostealer malware typically spreads by malicious downloads, phishing emails and faux web sites. Keep away from downloading software program or information from untrusted sources and all the time double-check hyperlinks earlier than clicking them. Attackers disguise malware as reputable software program, sport cheats or cracked purposes, so it’s best to stay to official web sites and app shops for downloads.
The easiest way to safeguard your self from malicious hyperlinks that set up malware, probably accessing your non-public info, is to have robust antivirus software program put in on all of your units. This safety may also provide you with a warning to phishing emails and ransomware scams, maintaining your private info and digital property secure. Get my picks for the most effective 2025 antivirus safety winners on your Home windows, Mac, Android and iOS units.
3. Use a password supervisor: Many infostealers goal saved passwords in net browsers. As a substitute of relying in your browser to retailer credentials, use a devoted password supervisor. Get extra particulars about my greatest expert-reviewed password managers of 2025 right here.
4. Maintain software program up to date: Cybercriminals exploit outdated software program to ship malware. Retaining your working system, browsers and safety software program updated ensures that recognized vulnerabilities are patched. Allow computerized updates at any time when doable and set up respected antivirus or endpoint safety software program that may detect and block infostealer threats earlier than they compromise your system.
HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY
Kurt’s key takeaway
Given the surge in infostealer malware warnings, it’s clear that cybercriminals are actively focusing on passwords. Each organizations and people are urged to strengthen their safety measures by enabling 2FA, monitoring credential publicity and utilizing endpoint safety instruments. Whereas no safety measure is totally foolproof, combining these practices can considerably scale back the chance of falling sufferer to infostealer malware.
CLICK HERE TO GET THE FOX NEWS APP
Do you are feeling that firms are doing sufficient to guard your information from infostealer malware and different cyber threats? Tell us by writing us at Cyberguy.com/Contact.
For extra of my tech suggestions and safety alerts, subscribe to my free CyberGuy Report E-newsletter by heading to Cyberguy.com/E-newsletter.
Ask Kurt a query or tell us what tales you need us to cowl.
Comply with Kurt on his social channels:
Solutions to probably the most requested CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.