KELA Report Reveals Alarming Rise of Infostealers and Ransomware Threats

Rise of Infostealers: A Deep Dive into Cybersecurity Risks



In the rapidly evolving world of cybersecurity, a new report from KELA has revealed alarming trends about the increasing prevalence of infostealer malware, which has seen a staggering 266% surge in activity over recent years. As a global leader in cyber threat intelligence solutions, KELA's findings present critical insights into the dangers facing corporate security today.

The report, Inside the Infostealer Epidemic: Exposing the Risks to Corporate Security, highlights how infostealer malware has become a central player in the cybercriminal ecosystem, particularly in facilitating credential theft that often leads to ransomware attacks. These malicious programs are designed to automate the process of stealing credentials, personal information, and sensitive corporate data, resulting in significant identity theft, fraud, and costly data breaches.

The Alarming Link Between Infostealers and Ransomware



Infostealers serve as a veritable gateway into organizations for cybercriminals, significantly enhancing the efficacy of ransomware attacks. The research delineates how many high-profile ransomware incidents, including the notorious Black Basta leak, have their roots in compromised infostealer logs. As noted by Lin Levi, a Threat Intelligence Analyst at KELA, the data highlights an alarming truth: cybercriminals are monetizing stolen credentials through a vibrant underground market, effectively turning these credentials into a currency of crime.

The report emphasizes the urgent need for organizations to adopt more proactive measures in protecting their digital landscape. With infostealer malware being marketed through models like Malware-as-a-Service (MaaS), the impact is broadening, and the sophistication of attacks is escalating. Many organizations remain unaware of the vulnerabilities in their networks until it's too late, often falling victim to ransomware demands.

Key Findings of the KELA Report



Some of the report’s critical revelations include:
  • - Infostealer Malware as a Catalyst: The rise in infostealer use has become a direct driver for various cyberattacks, laying the groundwork for ransomware among other threats.
  • - Evolving Stolen Credential Market: Cybercriminals are now leveraging automated markets and subscription-based systems for trading stolen credentials, making transactions faster and more efficient than ever.
  • - Victim Profiling: Analysis connected 300 infostealer victims in mid-2024 to sectors such as Project Management, Consulting, and Software Development, with significant vulnerabilities also noted within the Technology sector, particularly in Brazil. Interestingly, personal computers were more often compromised than work devices, with most affected credentials belonging to current employees.
  • - Ransomware Group Exploitation: The study also highlighted a concerning trend where ransomware groups such as Play, Akira, and Rhysida were found to be exploiting stolen credentials, sometimes only weeks before actual attacks occurred.

Strategies for Mitigating Infostealer Threats



KELA's report suggests several precautionary measures organizations should adopt to safeguard themselves against infostealer threats. These include effective threat monitoring systems, robust access management strategies, comprehensive endpoint protection, and fostering cybersecurity awareness among employees.

By actively engaging in these defensive strategies, businesses can help disrupt the cycle of credential theft before it escalates into more severe breaches or ransomware incidents.

Conclusion: A Call for Proaction



In a world where cybersecurity threats are growing more sophisticated and prevalent, KELA emphasizes the importance of vigilance and proactive strategies to combat infostealer activity and the resultant ransomware threats. Download the full report, Inside the Infostealer Epidemic, to gain further insights into this pressing issue. For those wishing to deepen their understanding, KELA is hosting an upcoming webinar led by Lin Levi that will delve into these findings in greater detail.

With the cyber threat landscape continuously evolving, organizations must prioritize their cybersecurity measures to not only protect their assets but also to maintain the trust of their clients and stakeholders. As KELA continues to explore the hidden realms of cybercrime, companies must remain informed and prepared to combat these digital threats effectively.

Topics Other)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.