Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Infostealer

From Wikipedia, the free encyclopedia
(Redirected fromStealware)
Malicious software used to steal information
Part of a series on
Computer hacking

Incomputing,infostealers are a form ofmalicious software created to breachcomputer systems to steal sensitive information, such aslogin details, financial information, and otherpersonally identifiable information. The stolen information is then packaged, sent to the attacker, and often traded on illicit markets to othercybercriminals.

Infostealers usually consist of a bot framework that allows the attacker to configure the behaviour of the infostealer, and a management panel that takes the form of a server to which the infostealer sends data. Infostealers infiltrate devices throughphishing attacks, infected websites, and malicious software downloads, includingvideo game mods andpirated software, among other methods. Once downloaded, the infostealers gather sensitive information about the user's device and send the data back to the server.

Infostealers are usually distributed under the malware-as-a-service (MaaS) model, wheredevelopers allow other parties to use their infostealers for subscription fees. The functionality of infostealers can vary, with some focused ondata harvesting, while others offerremote access that allows additional malware to be executed.Stolen data may then be used inspearphishing campaigns for other cyber-attacks, such as the deployment ofransomware or to sell it for profit.[1]

The number of stolendata logs being sold on the Russian Market, acybercrime forum, has increased significantly since 2022. According toKaspersky's research in mid-2023, 24% of malware offered as a service are infostealers.

Overview

[edit]
See also:Identity theft

Incybercrime, credential theft is a well-known mechanism through which malicious individuals stealpersonal information, such asusernames,passwords, orcookies, to illegitimately gain access to a victim's online accounts and computer. This crime typically unfolds in four stages, with the first being the acquisition of the stolen credentials. Infostealers are a specific type ofmalware that are designed for this initial stage. They usually consist of two distinct parts: the bot framework and acommand and control server, often known as the management panel or interface.[2]

The bot framework includes a builder that allows the attacker to configure how the infostealer will behave on a user's computer and what kind of information it will steal. The management interface, usually written in traditionalweb development languages likePHP,HTML, andJavaScript,[3] is typically hosted on the commercialcloud infrastructure.[4] The management interface primarily functions as aweb server to which the infostealer sends confidential information. The interface also provides the attacker with information about the status of deployed infostealers and allows the attacker to control their behaviour.[3]

Distribution and use

[edit]

Infostealers are commonly distributed through the malware-as-a-service (MaaS) model, enabling individuals with varying technical knowledge to deploy these malicious programs. Under this model, three distinct groups typically emerge: developers, malware service providers, and operators. Developers, the most technically skilled, write the infostealer code. Malware service providers purchase licenses for the malware and offer it as a service to other cybercriminals. The operators, who can be developers or service providers themselves depending on their skill level, use these services to performcredential theft.[2]

Once the malware is purchased, it is spread to target victim machines using varioussocial engineering techniques.Phishing, includingspear phishing campaigns that target specific victims, is commonly employed. Infostealers are commonly embedded inemail attachments or malicious links that link to websites that performdrive-by downloads.[3][5] Additionally, they are often bundled with compromised or maliciousbrowser extensions, infectedgame cheating packages, and pirated or otherwise compromised software.[5] After the stealer is downloaded and run by a victim, it communicates with the attacker'scommand-and-control servers, allowing the attacker to steal information from the user's computer. While most infostealers primarily target credentials, some also enable attackers to remotely introduce and execute other malware, such asransomware, on the victim's computer.[2][6]

Credentials obtained from infostealer attacks are often distributed as logs or credential dumps, typically shared on paste sites likePastebin, where cybercriminals may offer free samples, or sold in bulk on underground hacking forums, often for amounts as low as US$10.[7][8] Buyers of these stolen credentials usually log in to assess their value, particularly looking for credentials associated with financial services or linked to other credentials with similar patterns, as these are especially valuable.[9] High-value credentials are often sold to other cybercriminals at higher prices.[10] These credentials may then be used for various crimes, includingfinancial fraud,[11] integrating the credentials intozombie networks and reputation-boosting operations,[11] or as springboards for more sophisticated attacks, such as scamming businesses, distributing ransomware, or conducting state-sponsored espionage.[7][12] Additionally, some cybercriminals use stolen credentials forsocial engineering attacks, impersonating the original owner to claim they have been a victim of a crime and soliciting money from the victim's contacts.[13][14] Many buyers of these stolen credentials take precautions to maintain access for longer periods, such as changing passwords and usingTor networks to obscure their locations, which helps avoid detection by services that might otherwise identify and shut down the stolen credentials.[13][14]

Features

[edit]

An infostealer's primary function is to exfiltrate sensitive information about the victim to an attacker'scommand-and-control servers. The exact type of data that is exfiltrated will depend on the data-stealing features enabled by the operator and the specific variant of infostealer used.[15] Most infostealers, however, do contain functionality to harvest a variety of information about the host operating system, as well as system settings and user profiles. Some more advanced infostealers include the capability to introduce secondary malware, such asremote access trojans andransomware.[3]

In 2009, researchers at theSymantec Rapid Response team released a technical analysis of theZeus infostealer, one of the first infostealers to be created.[16] They found that the malware automatically exfiltrated all data stored in a computer's protected storage service (which was usually used byInternet Explorer to store passwords) and tries to capture any passwords sent to the computer using thePOP3 andFTP protocols. In addition to this, the malware allowed the researchers to define a set of configuration files to specify a list of web injections to perform on a user's computer as well as another configuration file that controlled which webURLs the malware would monitor. Another configuration also allowed the researchers to define a set of rules that could be used to test if additionalHTTP requests contained passwords or other sensitive information.[17]

More recently, in 2020, researchers at theEindhoven University of Technology conducted a study analysing the information available for sale on the underground credentialblack market impaas.ru. As part of their study, they were able to replicate the workings of a version of the AZORult infostealer. Amongst the functions discovered by the researchers was a builder, which allowed operators to define what kind of data would be stolen. The researchers also found evidence of plugins that stole a user'sbrowsing history, a customisableregex-based mechanism that allows the attacker to retrieve arbitrary files from a user's computer, a browser password extractor module, a module to extractSkype history, and a module to find and exfiltratecryptocurrency wallet files.[15]

The researchers also found that the data most frequently stolen using the AZORult infostealers and sold on the black market could be broadly categorised into three main types: fingerprints, cookies, and resources.Fingerprints consisted of identifiers that were constructed by probing a variety of features made available by the browser. These were not tied to a specific service but were considered to be an accurately unique identifier for a user's browsers.Cookies allowed buyers tohijack a victim's browser session by injecting it into a browser environment. Resources refer to browser-related files found on a user's operating system, such as password storage files.[18]

Economics and impact

[edit]

Setting up an infostealer operation has become increasingly accessible due to the proliferation of stealer-as-a-service enterprises, significantly lowering financial and technical barriers. This makes it feasible for even less sophisticated cybercriminals to engage in such activities.[3] In a 2023 paper, researchers from theGeorgia Institute of Technology noted that the hosted stealer market is extremely mature and highly competitive, with some operators offering to set up infostealers for as low as $12.[19] For the service providers running these stealer operations, the researchers estimated that a typical infostealer operator incurs only a few one-off costs: the license to use the infostealer, which is obtained from a malware developer, and the registration fee for the domain used to host thecommand-and-control server. The primary ongoing cost incurred by these operators is the cost associated with hosting the servers. Based on these calculations, the researchers concluded that the stealer-as-a-service business model is extremely profitable, with many operators achieving profit margins of over 90% with revenues in the high thousands of dollars.[20]

Due to their extreme profitability and accessibility, the number of cybersecurity incidents that involve infostealers has risen.[7] TheCOVID-19 post-pandemic shift towardsremote and hybrid work, where companies give employees access to enterprise services on their home machines, has been cited as one of the reasons behind the increase in the effectiveness of infostealers.[7][21] In 2023, research bySecureworks discovered that the number of infostealer logs, or data exfiltrated from each computer, increased from 2 million to 5 million logs from June 2022 to February 2023 on the Russian Market, the biggest underground cyberforum.[21] According toKaspersky's research in mid-2023, 24% of malware offered as a service are infostealers.[22] In 2024, infostealers were used to steal 2.1 billion credentials, over 60% of the 3.2 billion credentials stolen from all organizations. Infostealers are heavily utilized because of their low cost, with an average cost of $200 per month in 2024.[23] In February 2025, it was reported byHudson Rock that infostealers had compromised email accounts and credentials across multiple US government and military departments, including the FBI.[24]

References

[edit]

Citations

[edit]
  1. ^"Vietnamese-speaking hackers appear to be running global data theft operation through Telegram".therecord.media. Retrieved2025-08-08.
  2. ^abcAvgetidis et al. 2023, pp. 5308
  3. ^abcdeAvgetidis et al. 2023, pp. 5308–5309
  4. ^Avgetidis et al. 2023, pp. 5314, 5319
  5. ^abNurmi, Niemelä & Brumley 2023, p. 1
  6. ^Ryan 2021, p. 76
  7. ^abcdNewman 2024
  8. ^Nurmi, Niemelä & Brumley 2023, p. 2
  9. ^Nurmi, Niemelä & Brumley 2023, p. 6
  10. ^Nurmi, Niemelä & Brumley 2023, p. 7
  11. ^abNurmi, Niemelä & Brumley 2023, p. 8
  12. ^Muncaster 2023
  13. ^abOnaolapo, Mariconti & Stringhini 2016, p. 65,70,76
  14. ^abBursztein et al. 2014, p. 353
  15. ^abCampobasso & Allodi 2020, pp. 1669
  16. ^Grammatikakis et al. 2021, pp. 121
  17. ^Nicolas & Chien 2009, pp. 3–4
  18. ^Campobasso & Allodi 2020, pp. 1669–1670
  19. ^Avgetidis et al. 2023, p. 5309
  20. ^Avgetidis et al. 2023, p. 5318
  21. ^abHendery 2023
  22. ^Lyons 2024
  23. ^Kapko, Matt (2025-03-18)."Infostealers fueled cyberattacks and snagged 2.1B credentials last year".CyberScoop. Retrieved2025-04-22.
  24. ^"Infostealing Malware Infections in the U.S. Military & Defense Sector: A Cybersecurity Disaster in the Making".Infostealers.com. Hudson Rock. February 2025. Retrieved2025-09-16.

Sources

[edit]
Malware topics
Infectious malware
Concealment
Malware for profit
By operating system
Protection
Countermeasures
Licenses
Compensation models
Delivery methods
Deceptive and/or illicit
Software release life cycle
Copy protection
Threats
vectorial version
vectorial version
Defenses
Related
security
topics
Portal:
Retrieved from "https://en.wikipedia.org/w/index.php?title=Infostealer&oldid=1332180242"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp