The Infostealer Threat To Your Business Exposed As Attacks Surge 266%
By: bitcoin ethereum news|2025/05/02 23:30:02
0
Share
Your business is in danger as infostealer malware surges. As high-street retailers in the U.K. are the latest to fall victim to devastating cyberattacks, with ransomware high on the criminal agenda, now is the time to start taking one oft-undervalued attack type very seriously indeed. Infostealer malware is responsible for the theft of billions of credentials that find their way onto the dark web and other criminal forums. These are often used as the initial access vector for any number of cyberattacks, from ransomware to espionage, against businesses. The true extent of the infostealer problem has just been made very apparent in a new threat intelligence report that revealed how businesses are experiencing a 266% surge in the attack type. Forbes Microsoft Confirms Password Spraying Attack — What You Need To Know By Davey Winder The Infostealer Epidemic That Endangers Your Business When it comes to the criminal underworld, at least those players operating in the cyber arena, there’s one thing that holds more value, more currency, than anything else: credential theft. There is a very good reason for this, as you might imagine. Stolen and compromised passwords, along with two-factor authentication codes, can open the door to your networks and the corporate data within. Most ransomware attacks begin with an initial access broker providing such compromised credentials to a criminal affiliate of the ransomware operators who is responsible for accessing your systems and installing the malware. It’s not hyperbole to say that infostealer malware likely poses a bigger danger to your business than any other cyber threat right now. A new report from threat intelligence experts KELA, has now revealed just how big a threat to business it is. What’s more, the threat intelligence analysts have managed to determine which business sectors are most at risk. KELA warned that a 266% surge in the infostealer threat shows no sign of slowing down in 2025, especially as the research “highlights how cybercriminals are efficiently monetizing stolen credentials,” Lin Levi, KELA threat intelligence analyst, said, “creating a thriving underground market.” Forbes Save All Your Passwords Before June 1, Microsoft Warns App Users By Davey Winder The Infostealer Threat Intel Takeaways The main takeaways from theKela threat intelligence report can be summed up as: Infostealers are being sold, or rented out, to cybercriminal gangs on a malware-as-a-service basis. Cybercriminals are quickly moving to automated marketplaces and subscription-based models when it comes to the purchase of stolen credentials. Employees in project management (28%), consulting (12%), and software development (10.7%) roles were most frequently affected by the infostealer threat. Technology ranked as the most targeted industry sector, but aviation, IT services, automotive, manufacturing, professional services and non-profits weren’t far behind. Personal computers storing corporate credentials were more commonly infected than work devices. “Organizations must prioritize proactive measures such as credential security to disrupt these attack chains before they escalate into breaches and ransomware incidents,’ Levi concluded. Forbes Microsoft Admits Old Passwords Can Still Access Your Windows Account By Davey Winder Mitigating The Infostealer Malware Threat To Your Organization To best protect against the threat of infostealer attacks against your business, Kela recommended the following seven mitigations: Active defense monitoring Proactive access management Robust antivirus solutions Employee awareness training Multi-factor authentication Audit and review of access logs Incident response plan management The main takeaway, no matter what your business is, has to be that infostealer malware can no longer remain in the shadows when security is being discussed. Source: https://www.forbes.com/sites/daveywinder/2025/05/02/the-infostealer-threat-to-your-business-exposed-as-attacks-surge-266/
You may also like

Slow Down, That's the Answer to the Age of the Agent
Rather than worrying about AI, it's better to regain control of pace and judgment

From Cash to Cryptocurrency: Moving Towards a Unified Regulatory Path for Illegal Payments
By establishing a framework based on the principle of "general law" and broadly defining the function of "payment tools," future innovations can be automatically included in the regulatory perspective, thereby breaking the passive cycle of "innovation-regulation-re-innovation-re-regulation" and guid...

Who will own the most Bitcoin in 2026
In this article, we will examine some individuals, companies, and wallets that have become crypto whales based on on-chain data and their own public statements, and investigate the amount of Bitcoin they hold.

A private feud lasting 10 years, if not for OpenAI's "hypocrisy," would not have led to the world's strongest AI company, Anthropic
What shapes the global AI landscape is not only the competition of technological routes but also a personal trauma that has never healed.

"Crypto Tsar" steps down: 130 days of political performance come to an end, how much of Trump's crypto promise remains?
The encryption czar has left, and Trump has muted.

From Utopian Narratives to Financial Infrastructure: The "Disenchantment" and Shift of Crypto VC
Financial infrastructure is the real reason that attracts venture capital investment in the cryptocurrency field.

A decade-long personal feud, if not for OpenAI's "hypocrisy," there would be no globally leading AI company Anthropic
Shaping the global AI landscape is not just a battle of technical paths, but also a wound of private trauma that has never healed

a16z: The True Meaning of Strong Chain Quality, Block Space Should Not Be Monopolized
Essentially, this attribute allows stakeholders to have a "virtual lane" within a high-throughput blockchain to ensure their transactions can be included.

a16z: The True Meaning of Strong Chain Quality, Block Space Should Not Be Monopolized
Essentially, this attribute allows stakeholders to have "virtual lanes" within a high-throughput blockchain, ensuring that their transactions can be included.

2% user contribution, 90% trading volume: The real picture of Polymarket
Is Polymarket a battleground for retail investors or an arena for institutions?

Trump Can't Take It Anymore, 5 Signals of the US-Iran Ceasefire
From Oil Prices and Elections to Secret Negotiations, Are the US and Iran Really Heading for a Ceasefire?

Judge Halts Pentagon's Retaliation Against Anthropic | Rewire News Evening Brief
The "Orwellian" Term Stymies Pentagon's Supply Chain Risk Label for Anthropic

Midfield Battle of Perp DEX: The Decliners, The Self-Savers, and The Latecomers
Hyperliquid has captured this wave of geopolitical market trends with commodity contracts. Decentralized exchanges are moving from internal competition within the crypto industry to a genuine alternative to traditional financial infrastructure, and this direction has only just begun.

Iran War Stalemate: What Signal Should the Market Follow?
Watch the Bond Market

Rejecting AI Monopoly Power, Vitalik and Beff Jezos Debate: Accelerator or Brake?
Can technological advancement be guided, or has it already gone beyond our control?

Insider Trading Alert! Will Trump Call a Truce by End of April?
Multiple Accounts Accurately Predict War, Earn $1.8 Million

After establishing itself as the top tokenized stock, does Ondo have any new highlights?
The total market capitalization of the global stock market is about $150 trillion, while the tokenized stocks market is currently only $10 billion in size, making it akin to a nascent super market that has just cracked the door open.

BIT Brand Upgrade First Appearance, Hosts "Trust in Digital Finance" Industry Event in Singapore
Discussing topics such as governance standards, compliance frameworks, and operational infrastructure within the context of the institutionalization process
Slow Down, That's the Answer to the Age of the Agent
Rather than worrying about AI, it's better to regain control of pace and judgment
From Cash to Cryptocurrency: Moving Towards a Unified Regulatory Path for Illegal Payments
By establishing a framework based on the principle of "general law" and broadly defining the function of "payment tools," future innovations can be automatically included in the regulatory perspective, thereby breaking the passive cycle of "innovation-regulation-re-innovation-re-regulation" and guid...
Who will own the most Bitcoin in 2026
In this article, we will examine some individuals, companies, and wallets that have become crypto whales based on on-chain data and their own public statements, and investigate the amount of Bitcoin they hold.
A private feud lasting 10 years, if not for OpenAI's "hypocrisy," would not have led to the world's strongest AI company, Anthropic
What shapes the global AI landscape is not only the competition of technological routes but also a personal trauma that has never healed.
"Crypto Tsar" steps down: 130 days of political performance come to an end, how much of Trump's crypto promise remains?
The encryption czar has left, and Trump has muted.
From Utopian Narratives to Financial Infrastructure: The "Disenchantment" and Shift of Crypto VC
Financial infrastructure is the real reason that attracts venture capital investment in the cryptocurrency field.
