The Infostealer Threat To Your Business Exposed As Attacks Surge 266%

By: bitcoin ethereum news|2025/05/02 23:30:02
0
Share
copy
Your business is in danger as infostealer malware surges. As high-street retailers in the U.K. are the latest to fall victim to devastating cyberattacks, with ransomware high on the criminal agenda, now is the time to start taking one oft-undervalued attack type very seriously indeed. Infostealer malware is responsible for the theft of billions of credentials that find their way onto the dark web and other criminal forums. These are often used as the initial access vector for any number of cyberattacks, from ransomware to espionage, against businesses. The true extent of the infostealer problem has just been made very apparent in a new threat intelligence report that revealed how businesses are experiencing a 266% surge in the attack type. Forbes Microsoft Confirms Password Spraying Attack — What You Need To Know By Davey Winder The Infostealer Epidemic That Endangers Your Business When it comes to the criminal underworld, at least those players operating in the cyber arena, there’s one thing that holds more value, more currency, than anything else: credential theft. There is a very good reason for this, as you might imagine. Stolen and compromised passwords, along with two-factor authentication codes, can open the door to your networks and the corporate data within. Most ransomware attacks begin with an initial access broker providing such compromised credentials to a criminal affiliate of the ransomware operators who is responsible for accessing your systems and installing the malware. It’s not hyperbole to say that infostealer malware likely poses a bigger danger to your business than any other cyber threat right now. A new report from threat intelligence experts KELA, has now revealed just how big a threat to business it is. What’s more, the threat intelligence analysts have managed to determine which business sectors are most at risk. KELA warned that a 266% surge in the infostealer threat shows no sign of slowing down in 2025, especially as the research “highlights how cybercriminals are efficiently monetizing stolen credentials,” Lin Levi, KELA threat intelligence analyst, said, “creating a thriving underground market.” Forbes Save All Your Passwords Before June 1, Microsoft Warns App Users By Davey Winder The Infostealer Threat Intel Takeaways The main takeaways from theKela threat intelligence report can be summed up as: Infostealers are being sold, or rented out, to cybercriminal gangs on a malware-as-a-service basis. Cybercriminals are quickly moving to automated marketplaces and subscription-based models when it comes to the purchase of stolen credentials. Employees in project management (28%), consulting (12%), and software development (10.7%) roles were most frequently affected by the infostealer threat. Technology ranked as the most targeted industry sector, but aviation, IT services, automotive, manufacturing, professional services and non-profits weren’t far behind. Personal computers storing corporate credentials were more commonly infected than work devices. “Organizations must prioritize proactive measures such as credential security to disrupt these attack chains before they escalate into breaches and ransomware incidents,’ Levi concluded. Forbes Microsoft Admits Old Passwords Can Still Access Your Windows Account By Davey Winder Mitigating The Infostealer Malware Threat To Your Organization To best protect against the threat of infostealer attacks against your business, Kela recommended the following seven mitigations: Active defense monitoring Proactive access management Robust antivirus solutions Employee awareness training Multi-factor authentication Audit and review of access logs Incident response plan management The main takeaway, no matter what your business is, has to be that infostealer malware can no longer remain in the shadows when security is being discussed. Source: https://www.forbes.com/sites/daveywinder/2025/05/02/the-infostealer-threat-to-your-business-exposed-as-attacks-surge-266/

You may also like

Why is a16z Crypto raising another $2.2 billion to heavily invest in Web3?

This round of funding bets on the transition of cryptocurrency from the infrastructure development phase to the phase of real user adoption. Whether focusing on cryptocurrency or crossing over to AI, this real money will only flow to those places that can turn technology into products.

Polymarket Underlying Algorithm Explained

It may be the only article on Twitter that clearly explains all the underlying design of Polymarket in plain language.

What do projects born in the crypto bear market do?

From January to April, RootData has recorded over 1,070 new projects, a decrease of about 32% compared to the same period last year.

a16z founder's Stanford lecture: Whenever Wall Street and Silicon Valley have different ideas, it's Wall Street that ends up being wrong

Ben Horowitz, co-founder of a16z, delivered a powerful talk: The two traditional moats of software in the AI era have been erased, and entrepreneurs must seek "new barriers" beyond code and UI.

Michael Saylor: After three consecutive quarters of losses, Strategy will sell Bitcoin to pay dividends

After MSTR's financial report showed continued net losses, Saylor changed his stance: Bitcoin is no longer "never to be sold" and can be used as a payment tool.

The toll station at Hormuz and the RMB that cannot be bought

The disorder of the US dollar is giving rise to a new situation in global settlement: gold is being redefined as a "bridge," the CIPS system is expanding rapidly, and global funds are quietly opening up a new channel for the renminbi, which is "hard to obtain."
iconiconiconiconiconiconicon
Customer Support:@weikecs
Business Cooperation:@weikecs
Quant Trading & MM:bd@weex.com
VIP Program:support@weex.com