How Cybercriminals Target the Unwary with Info Stealers

A Malware Designed to Harvest Information is Evolving

A computer hacker at a security system to steal critical information.

Cybersecurity is something that affects the real estate industry and our daily lives. In honor of Cybersecurity Awareness Month, Stewart Chief Information Security Officer, Genady Vishnevetsky, is sharing insight into cybercriminals’ latest tactics that may affect real estate professionals and consumers alike. In this blog, he shares a detailed review of “info stealer” malware.

In the digital age, our online presence has become an integral part of our lives, facilitating communication, work and entertainment. Identity is king and user credentials are the key to that kingdom. Imagine a bad actor gaining access, not to a single credential through a phishing email, but to all credentials users ever used or stored on your computer. That would be a treasure trove for the criminal. Welcome to the world of info stealers.

What is an “info stealer”?

Info stealers, a type of malware designed to harvest sensitive information from infected systems, have undergone a significant evolution. From their modest beginnings to their current sophisticated forms, info stealers have evolved to become more accessible, affordable and lethal. This evolution is a crucial aspect of the changing cybersecurity landscape that every internet user should be aware of.

Info stealers first emerged in the early 2000s, primarily targeting passwords and basic login credentials. These early versions were relatively simple and often spread through phishing emails or malicious attachments. However, as cybersecurity measures improved, so did the sophistication of info stealers.

What kind of sensitive information does this malware steal?

Over the years, info stealers have evolved to target a wide array of sensitive data, including session IDs and cookies, credit card details, bank account numbers, cryptocurrency wallets, personal information like names, email addresses, home addresses, phone numbers, and date of birth, as well as technical details like IP addresses, operating system details and installed software. This breadth of data makes them a significant threat to your online security.

How does info stealer malware work?

They achieve their objectives through the following most commonly used capabilities:

This expansion in capabilities has been driven by the development of new variants and the adoption of advanced techniques, such as:

Today, info stealers are more accessible and affordable than ever. The dark web and Telegram channels have become hotspots for purchasing stolen data and malware tools, with prices starting as low as $120 per month. This accessibility has led to a surge in the number of developed stealers and their use in various cyber-attacks. They exploit social media platforms to steal credentials and fuel sophisticated social engineering attacks. They also use MFA fatigue attacks, bombarding victims with MFA prompts to gain unauthorized access. The shift towards remote work has expanded the attack surface for infostealers, particularly with BYOD (Bring Your Own Device) policies and the blurring of personal and professional data boundaries.

What are common ways this type of malware spreads?

The info stealers use traditional methods to propagate. Many of them are decades old. Here are some common to be aware of:

What are the dangers of info stealer malware?

Info stealers are extremely dangerous and can result in:

What steps can I take to protect myself from info stealer malware?

While the threat of info stealers is significant, there are steps users can take to protect themselves. Here are some practical tips:

Info stealers have evolved significantly over the years, becoming more sophisticated and dangerous. Their accessibility and affordability have made them a primary method for various cyberattacks.

We thank Genady for sharing this detailed review of info stealing malware and what to look out for. Stay tuned for more cyber security blogs on Insights as we observe Cybersecurity Awareness Month.

Interested in more cyber security articles? Check these out:

Wire Fraud 101: What is it and How Do You Help Prevent It?
Red Flags to Never Ignore in Real Estate
Staying Ahead of Seller Impersonation Fraud