Infostealer malware increased in 2024, hackers used it to steal credentials, cryptocurrency and other personal data from millions of users. If you remember, I reported countless times The Infostealer incident called Lumma Get Android, Windows, and even iOS and Mac users.
A new cybersecurity report, along with hackers using Lumma and STEALC, Redline and other infosealers, underscored 4.3 million units in 2024, bringing an astounding 330 million compromised qualifications I'm doing it.
Security researchers are also observing 3.9 billion credentials shared in a list of credentials that appear to be procured from Infostealer logs.
Hacker illustration at work (Kurt “Cyberguy” Knutsson)
Infosealer-related attacks on the 2024 increase
a Cybersecurity Report With its threat intelligence platform, Kera revealed a sharp rise in Infosturer malware in 2024. Researchers observed surprising trends in how stolen data was distributed. Large compilation of credentials, often referred to as “credentials,” was shared throughout the Cybercrime forum. These lists were sourced primarily from Infostealer logs and included details of billions of logins harvested from infected devices.
One of the most notable incidents related to Infostealer malware was a violation of cloud data storage provider Snowflake. In April 2024, the threat actor accessed the customer account using the stolen login credentials. Taking advantage of weak security practices such as the lack of multifactor authentication, attackers attempted to extract valuable data and later sell it in the underground market. The violations affected at least 165 companies.
What is Artificial Intelligence (AI)?
The Kela report highlights that hackers have deployed 4.3 million machines and compromised 330 million qualifications by Lumma, Stealc, Redline and other infostealers. Almost 40% of these infected machines included corporate systems credentials, such as content management platforms, email accounts, Active Directory Federation Services, and remote desktop environments. In total, this accounted for 1.7 million breach bots and 7.5 million stolen qualifications.
The report also found that 3.9 billion credentials are shared in a list of credentials that appear to be procured from Infostealer logs. Kela's analysis suggests that almost 65% of infected devices are personal computers that store corporate credentials, and are the main targets of Infostealer malware.

Hacker illustration at work (Kurt “Cyberguy” Knutsson)
How to delete private data from the Internet
2025 is no different
Infostealer malware won't go anywhere in 2025. With Malware-as-aaaaaaaaaaaaaaaaaaaaaaaaaaaaas-aaaaaaaaaas-cybercriminals likely continue to use their qualifications as a go-to method to steal and gain access to the system.
But law enforcement is cracking down. In 2024, authorities were able to defeat a key part of the Infostealer ecosystem, including the disruption of Redline, one of the most widely used Infostealers. This showed that international organizations could chase not only malware developers but also the networks and underground markets that continue to maintain these businesses.
However, such takedowns rarely end the problem. Once one major info-sealer operation is closed, others will immediately step in instead. The constant demand for stolen credentials and the ability of cybercriminals to adapt means that infosealer attacks are likely to remain a major threat in 2025.
Click here to get your Fox business on the go

Hacker illustration at work (Kurt “Cyberguy” Knutsson)
Best virus protection for MAC, PC, iPhone and Android – CyberGaipic
How to stay safe from Infostealer malware
With Infostealer's malware becoming an increasing threat, data protection combines smart security habits with reliable tools. Below are some effective ways to keep your information safe.
1. Enabling 2-factor authentication (2FA): Even if your credentials are stolen 2FA Adds an additional layer of security by requesting second form of verification, such as verification of authentication app code and biometric authentication. Cybercriminals are considered relying on stolen usernames and passwords, but with 2FA enabled, they are not accessible without additional security steps. Please enable 2FA on important accounts such as email, banking, and work-related logins.
2. Use powerful antivirus software and beware of downloads and links. Infostealer malware is often spread through malicious downloads, phishing emails, and fake websites. Do not download software or files from untrusted sources or always double-check the link before clicking it. It is recommended that attackers stick to official websites and app stores for download, as they disguise the malware as legitimate software, game cheats, or crack applications.
The best way to protect yourself from malicious links to install malware is to install powerful antivirus software on all your devices, as it may access your personal information. This protection can also warn you that it will phish email and ransomware scams and keep your personal information and digital assets safe. Get the best 2025 Antivirus Protection Winners picks for Windows, Mac, Android and iOS devices.
3. Using the Password Manager: Many Infostealers target saved passwords in web browsers. Instead of relying on your browser to store your credentials, use a dedicated password manager. Get my details Find the best expert reviewed password managers of 2025 here.
4. Update your software: Cybercriminals leverage outdated software to provide malware. Keep your operating system, browser and security software up to date Ensures that known vulnerabilities are patched. Install reputable antivirus or endpoint protection software that enables automatic updates whenever possible and allows you to detect and block Infosteeler threats before you compromise your system.
How to fight debit card hackers after your money
Important points of cart
Given the surge in Infostealer's malware warnings, it's clear that cybercriminals are actively targeting passwords. Both organizations and individuals are encouraged to enhance security measures by enabling 2FA, monitoring credential exposure, and using endpoint protection tools. Security measurements are not completely unacceptable, but these practices combine to significantly reduce the risk of reducing Infostealer malware casualties.
Click here to get the Fox News app
Do you think companies are doing enough to protect their data from Infostealer malware and other cyber threats? Write us and let us know cyberguy.com/contact.
For more information about my tech tips and security alerts, sign up for our free Cyberguy Report Newsletter cyberguy.com/newsletter.
Please ask your cart or tell us what stories you would like us to cover.
Follow your cart on his social channels:
Answers to the most asked Cyber Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.
