"Once The Domain of Pirated Games, 'Infostealers' Have Racked Up Hundreds of Thousands of Employee Logins"

Titan, Redline, and other infostealers target Internet users searching for pirated copies of games and software. However, according to a new report from Flare.io, they are increasingly making their way into corporate environments, possibly due to the blurring between personal and work devices. The report reveals that about 400,000 employee logins are available for sale on the dark web and illegal Telegram channels. Once installed, infostealers normally compromise user web browsers and capture various login information. Anything saved in a web browser or entered into a field is vulnerable to interception, which includes passwords and files uploaded or downloaded. Many infostealers can secretly take screenshots. The malware embeds itself into target systems for long-term file exfiltration, using different techniques to avoid detection. The primary focus of infostealers has been "carding," or the theft of credit card numbers and cryptocurrency wallet logins. However, Flare's analysis of nearly 20 million stealer logs revealed that the presence of employee logins and other corporate network credentials is rising. This article continues to discuss infostealers becoming more common on company networks. 

CPO Magazine reports "Once The Domain of Pirated Games, 'Infostealers' Have Racked Up Hundreds of Thousands of Employee Logins"

Submitted by Anonymous on