Breaking News

Nearly 4 billion passwords exposed to malicious software


We increased the increase in the malicious software of the 2024 Infosteler, and the hackers used it for the theft of credentials, the crypto currency and other personal data from millions of users. If you remember, I reported countless Incidents of Infostelers called Lumma Viewing on Android, Windows, and even iOS and MAC users.

The new Cyber ​​-Safe report now emphasizes that the hackers used by Lumma, along with Steal, Redline and other infoestrles, infected 4.3 million machines in 2024, leading to the stunning 330 million compromised credentials.

Safety researchers They also noticed 3.9 billion credentials that were divided on credentials listing that they seem to have been obtained from the Infosteler’s Record.

Stay protected and informed! Get security warnings and professional technological tips – sign up for Cyberguy Kurt’s report

Hacker illustration (Kurt “Cyberguy” Knutsson)

Infoster -related attacks on an increase in 2024

AND Cybernetic security report Kelo’s auxiliary intelligence platforms revealed a sudden increase in the malicious software of Infostelers 2024. Researchers also noticed an alarming trend in circulating stolen data. Large compilations of credentials, often referred to as “credential lists”, are divided into cyber crime forums. These lists, primarily obtained from Infosteler’s diary, contained billions of details about the application collected from the infected devices.

One of the most prominent incidents associated with the malicious infosor software was a violation of Snowflake, a cloud storage provider. In April 2024, threat actors were given access to user accounts using stolen credentials for the application, many of which were obtained through the infoosteller. By exploiting poor safety practices, such as the absence of multifactor authentication, the attackers pulled out valuable data and later tried to sell it in the underground markets. The violation affected at least 165 companies.

What is artificial intelligence (AI)?

Kela’s report points out hackers arranging lummaThe stolen, red line and other infoestrles infected 4.3 million machines, leading to compromise 330 million credentials. Nearly 40% of these infected machines contained credentials for corporate systems, including content management platforms, E E -Stands, Active Directory Federation Services and an environment on a remote table computer. In total, this made 1.7 million compromised bots and 7.5 million stolen credentials.

The report was also found that 3.9 billion credentials were divided on credentials that seem to have been obtained from the Infoster Course. Kela analysis suggests that almost 65% of infected devices were personal computers that stored corporate credentials, making them the main goal for the malicious infostealer software.

Hacker illustration (Kurt “Cyberguy” Knutsson)

How to remove your private information from the Internet

2025. It will not be different

The malicious software of the infososthelers does not go anywhere in 2025. With the platforms of malicious software as well as the rise and infestilers services are becoming more advanced, Cyber-criminals are likely to use them as a method for the theft of credentials and obtain access to systems.

The implementation of the law Still, he broke. 2024. Authorities were able to overthrow the key parts of the ecosystem of infotellers, including the intercourse of Redline, one of the most commonly used infotellers. This has shown that international agencies can go not only to the developers of malicious software, but also with nets and underground markets that maintain these operations.

But they are removed like these rarely stop the problem. When one major infooster surgery goes out, the other quickly enters their place. Permanent demand for stolen credentials and the ability to Cyber ​​-criminal to adjust to means infestal attacks are likely to remain a major threat in 2025.

Get a job with Fox on a clicking movement here

Hacker illustration (Kurt “Cyberguy” Knutsson)

Best Antivirus for Mac, PC, iPhone and Androids – Cyberguy Picks

Ways to stay safe from malicious infestaler software

Because the malicious software infostealer becomes a growing threat, the protection of your data requires a combination of smart security habits and reliable tools. Here are some effective ways to store your information.

1. Enable a dual -factor authentication (2FA): Even if your credentials are stolen, 2fa Adds an additional layer of security, demanding another form of check, such as code from the authentication application or biometric certificate. Cyber-Kriminalians rely on stolen user names and passwords to interrupt the accounts, but with the 2FA enabled they cannot get access without an additional safety step. Be sure to enable 1 in important accounts such as email, banking and work login.

2. Use strong antiviral software and be careful with downloads and relationships: Malware Infostealler often spreads through malicious downloads, Phishing E -Mail and False Website. Avoid downloading software or files from unreliable sources and always double check the links before clicking them. The attackers disguise the malicious software as legitimate software, cheating on games or cracked apps, so it is best to adhere to official websites and the retailer stores to download.

The best way to protect yourself from malicious connections installed by malicious software, potentially access to your private data, is to install a strong antivirus software on all your devices. This protection can also alert you of phishing e -Mail and fraud from Ransomware, keeping your personal information and digital assets. Get my elections for the best winners to protect against antivirus 2025 for your Windows, Mac, Android and iOS devices.

3. Use password manager: Many infoestrles are aiming to save passwords in web browsers. Instead of relying on your credential storage browser, use a dedicated password manager. Get more details about my Best reviewed password managers from 2025. Here.

4. Maintain the software: Cyber ​​-Criminals exploit the outdated software to deliver malicious software. Maintaining your operating system, browser and security software updated It ensures that the known vulnerability is patched. Enable automatic updates whenever possible and install reputable anti -anti -anti -anti -protection software or endpoints that can detect and block the threats of Infosteler before threatening your system.

How to reciprocate against the hackers of debit cards that are after your money

Kurt’s key step

Given the increase in the warning of the malicious infestaler software, it is clear that the Cyber ​​-criminals are actively targeting passwords. Both organizations and individuals are invited to strengthen their safety measures by enabling the 1F, monitoring the exposure of credentials and the use of the tools for the protection of end points. Although no safety measure is completely dumb, combining these practices can significantly reduce the risk of becoming a victim of malicious software.

Click here to get the Fox News app

Do you consider companies to work enough to protect your information from the malicious software of Infosteler and other Cyber ​​threats? Let us know by writing us on Cyberguy.com/contact.

For more of my technological tips and security warnings, subscribe to my free newsletter about Cyberguy Report, moving toward Cyberguy.com/newslettter.

Ask the Kurt question or let us know what stories you would like to cover.

Follow Kurt on his social channels:

Answer to Cyberguya’s most needed questions:

New from Kurt:

Copyright 2025 Cyberguy.com. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Social Media Auto Publish Powered By : XYZScripts.com