news
January 23, 2023by Benji Preminger

Stealer malware: This simple software helps amateurs hack big targets

The number of compromised credentials for sale on the dark web has never been higher. Stolen logins pose a grave threat to companies and individuals, exposing sensitive corporate and private data to malicious cybercriminals.

Last month, several prolific underground markets auctioned off millions of login credentials stolen from over 700,000 infected computers, phones, and tablets. These included login access to all systems and platforms - from personal email and bank accounts to sensitive corporate and government portals.

The threat posed by compromised credentials has never been more acute. Data (such as login credentials) obtained illegally using stealer malware is for sale on many underground markets, allowing cybercriminals to gain unauthorized access to private accounts and networks. From this beachhead, having established a foothold into the targeted system, threat actors can launch further attacks - deploying ransomware, siphoning system resources, harvesting confidential data, and assuming control of logged-in financial accounts.

The Cybersixgill Portal finds leaks and alerts organizations in real time.

As the name suggests, Stealer malware is designed to swipe sensitive data from a victim's computer or network. The stolen data can include login credentials, stored cookies, financial data, personal information, and other sensitive documents and files.  

Stealer malware is distributed through various means, including fake applications, pirated software, 'malvertising' campaigns, email attachments, targeted phishing lures, and seemingly innocuous links clicked by users browsing the internet. Once installed on the victim's device, the malware operates silently in the background, covertly recording keystrokes and exfiltrating sensitive data without the victim's knowledge. This harvested data is stored in logs and transferred from the infected device to the hacker's remote command-and-control (c2) server. Having accrued multiple logs from their ecosystem of infected devices ("botnets"), the threat actor then packages and sells the stolen access credentials to the highest bidder on their dark web marketplace.

The purchaser of these so-called "stealer logs" can then leverage the access credentials as a starting point to launch various further attacks - depending on their level of sophistication.

On the lower end of the scale, "script kiddies" and other amateur fraudsters use the credentials to hijack accounts, siphon off stored resources and exfiltrate valuable data. At this point, they will often resell the same access to other cybercriminals in secondary underground markets.

Learn more about how Cybersixgill automatically aggregates data leaks and alerts customers in real time.

You may also like

Pink and blue geometric orb symbolizing Third-Party Intel Supply Chain

April 24, 2024

Illuminating a threat analyst’s blind spot: third-party threat intelligence

Read more
View from the entrance of a tunnel with tracks extending towards a futuristic, dystopian cityscape.

April 19, 2024

Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

Read more
SOTU-Ransomware blog thumbnail

April 17, 2024

State of the Underground 2024: Two ways to guard against the ongoing threat of ransomware

Read more