In
computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, hardware and softw ...
, infostealers are a form of
malicious software
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
created to breach
computer system
A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic sets of operations known as ''programs'', wh ...
s to steal sensitive information, such as
login details, financial information, and other
personally identifiable information
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
. The stolen information is then packaged, sent to the attacker, and often traded on illicit markets to other
cybercriminals.
Infostealers usually consist of a bot framework that allows the attacker to configure the behaviour of the infostealer, and a management panel that takes the form of a server to which the infostealer sends data. Infostealers infiltrate devices through
phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
attacks, infected websites, and malicious software downloads, including
video game mods
Video game modding (short for "modifying") is the process of alteration by players or fans of one or more aspects of a video game, such as how it looks or behaves, and is a sub-discipline of general ''modding''. A set of modifications, commonly c ...
and
pirated software, among other methods. Once downloaded, the infostealers gather sensitive information about the user's device and send the data back to the server.
Infostealers are usually distributed under the malware-
as-a-service (MaaS) model, where
developers allow other parties to use their infostealers for subscription fees. The functionality of infostealers can vary, with some focused on
data harvesting, while others offer
remote access that allows additional malware to be executed.
Stolen data may then be used in
spearphishing campaigns for other cyber-attacks, such as the deployment of
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
.
The number of stolen
data logs being sold on the Russian Market, a
cybercrime forum, has increased significantly since 2022. According to
Kaspersky's research in mid-2023, 24% of malware offered as a service are infostealers.
Overview
In
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
, credential theft is a well-known mechanism through which malicious individuals steal
personal information
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
, such as
usernames,
password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
s, or
cookies
A cookie is a sweet biscuit with high sugar and fat content. Cookie dough is softer than that used for other types of biscuit, and they are cooked longer at lower temperatures. The dough typically contains flour, sugar, egg, and some type of ...
, to illegitimately gain access to a victim's online accounts and computer. This crime typically unfolds in four stages, with the first being the acquisition of the stolen credentials. Infostealers are a specific type of
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
that are designed for this initial stage. They usually consist of two distinct parts: the bot framework and a
command and control server
A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform distributed denial-of-service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conne ...
, often known as the management panel or interface.
The bot framework includes a builder that allows the attacker to configure how the infostealer will behave on a user's computer and what kind of information it will steal. The management interface, usually written in traditional
web development
Web development is the work involved in developing a website for the Internet (World Wide Web) or an intranet (a private network). Web development can range from developing a simple single static page of plain text to complex web applications, ...
languages like
PHP
PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by the PHP Group. ...
,
HTML
Hypertext Markup Language (HTML) is the standard markup language for documents designed to be displayed in a web browser. It defines the content and structure of web content. It is often assisted by technologies such as Cascading Style Sheets ( ...
, and
JavaScript
JavaScript (), often abbreviated as JS, is a programming language and core technology of the World Wide Web, alongside HTML and CSS. Ninety-nine percent of websites use JavaScript on the client side for webpage behavior.
Web browsers have ...
,
is typically hosted on the commercial
cloud infrastructure
Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to ISO.
Essential characteristics ...
. The management interface primarily functions as a
web server
A web server is computer software and underlying Computer hardware, hardware that accepts requests via Hypertext Transfer Protocol, HTTP (the network protocol created to distribute web content) or its secure variant HTTPS. A user agent, co ...
to which the infostealer sends confidential information. The interface also provides the attacker with information about the status of deployed infostealers and allows the attacker to control their behaviour.
Distribution and use
Infostealers are commonly distributed through the malware-
as-a-service (MaaS) model, enabling individuals with varying technical knowledge to deploy these malicious programs. Under this model, three distinct groups typically emerge: developers, malware service providers, and operators. Developers, the most technically skilled, write the infostealer code. Malware service providers purchase licenses for the malware and offer it as a service to other cybercriminals. The operators, who can be developers or service providers themselves depending on their skill level, use these services to perform
credential theft.
Once the malware is purchased, it is spread to target victim machines using various
social engineering techniques.
Phishing
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
, including
spear phishing
Phishing is a form of Social engineering (security), social engineering and a scam where attackers deceive people into revealing Information sensitivity, sensitive information or installing malware such as Computer virus, viruses, Computer worm, ...
campaigns that target specific victims, is commonly employed. Infostealers are commonly embedded in
email attachment
An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient. This is typically used as a simple method to share documents and images.
...
s or malicious links that link to websites that perform
drive-by downloads.
Additionally, they are often bundled with compromised or malicious
browser extension
A browser extension is a software module for customizing a web browser. Browsers typically allow users to install a variety of extensions, including user interface modifications, cookie management, ad blocking, and the custom scripting and st ...
s, infected
game cheating packages, and pirated or otherwise compromised software.
After the stealer is downloaded and run by a victim, it communicates with the attacker's
command-and-control servers, allowing the attacker to steal information from the user's computer. While most infostealers primarily target credentials, some also enable attackers to remotely introduce and execute other malware, such as
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
, on the victim's computer.
Credentials obtained from infostealer attacks are often distributed as logs or credential dumps, typically shared on paste sites like
Pastebin, where cybercriminals may offer free samples, or sold in bulk on underground hacking forums, often for amounts as low as US$10.
Buyers of these stolen credentials usually log in to assess their value, particularly looking for credentials associated with financial services or linked to other credentials with similar patterns, as these are especially valuable.
High-value credentials are often sold to other cybercriminals at higher prices.
These credentials may then be used for various crimes, including
financial fraud
In law, fraud is intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover mone ...
,
integrating the credentials into
zombie networks and reputation-boosting operations,
or as springboards for more sophisticated attacks, such as scamming businesses, distributing ransomware, or conducting state-sponsored espionage.
Additionally, some cybercriminals use stolen credentials for
social engineering attacks, impersonating the original owner to claim they have been a victim of a crime and soliciting money from the victim's contacts.
Many buyers of these stolen credentials take precautions to maintain access for longer periods, such as changing passwords and using
Tor networks to obscure their locations, which helps avoid detection by services that might otherwise identify and shut down the stolen credentials.
Features
An infostealer's primary function is to exfiltrate sensitive information about the victim to an attacker's
command-and-control servers. The exact type of data that is exfiltrated will depend on the data-stealing features enabled by the operator and the specific variant of infostealer used.
Most infostealers, however, do contain functionality to harvest a variety of information about the host operating system, as well as system settings and user profiles. Some more advanced infostealers include the capability to introduce secondary malware, such as
remote access trojans and
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
.
In 2009, researchers at the
Symantec Rapid Response team released a technical analysis of the
Zeus
Zeus (, ) is the chief deity of the List of Greek deities, Greek pantheon. He is a sky father, sky and thunder god in ancient Greek religion and Greek mythology, mythology, who rules as king of the gods on Mount Olympus.
Zeus is the child ...
infostealer, one of the first infostealers to be created. They found that the malware automatically exfiltrated all data stored in a computer's protected storage service (which was usually used by
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
to store passwords) and tries to capture any passwords sent to the computer using the
POP3
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. Today, POP version 3 (POP3) is the most commonly used version. Together with IMAP, i ...
and
FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and dat ...
protocols. In addition to this, the malware allowed the researchers to define a set of configuration files to specify a list of web injections to perform on a user's computer as well as another configuration file that controlled which web
URL
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identi ...
s the malware would monitor. Another configuration also allowed the researchers to define a set of rules that could be used to test if additional
HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
requests contained passwords or other sensitive information.
More recently, in 2020, researchers at the
Eindhoven University of Technology
The Eindhoven University of Technology (), Abbreviation, abbr. TU/e, is a public university, public technical university in the Netherlands, situated in Eindhoven. In 2020–21, around 14,000 students were enrolled in its Bachelor of Science, BS ...
conducted a study analysing the information available for sale on the underground credential
black market
A black market is a Secrecy, clandestine Market (economics), market or series of transactions that has some aspect of illegality, or is not compliant with an institutional set of rules. If the rule defines the set of goods and services who ...
impaas.ru. As part of their study, they were able to replicate the workings of a version of the
AZORult infostealer. Amongst the functions discovered by the researchers was a builder, which allowed operators to define what kind of data would be stolen. The researchers also found evidence of plugins that stole a user's
browsing history
Web browsing history refers to the list of web pages a user has visited, as well as associated metadata such as page title and time of visit. It is usually stored locally by web browsers in order to provide the user with a history list to go back ...
, a customisable
regex
A regular expression (shortened as regex or regexp), sometimes referred to as rational expression, is a sequence of characters that specifies a match pattern in text. Usually such patterns are used by string-searching algorithms for "find" ...
-based mechanism that allows the attacker to retrieve arbitrary files from a user's computer, a browser password extractor module, a module to extract
Skype
Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
history, and a module to find and exfiltrate
cryptocurrency
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership record ...
wallet files.
The researchers also found that the data most frequently stolen using the AZORult infostealers and sold on the black market could be broadly categorised into three main types: fingerprints, cookies, and resources.
Fingerprints consisted of identifiers that were constructed by probing a variety of features made available by the browser. These were not tied to a specific service but were considered to be an accurately unique identifier for a user's browsers.
Cookies
A cookie is a sweet biscuit with high sugar and fat content. Cookie dough is softer than that used for other types of biscuit, and they are cooked longer at lower temperatures. The dough typically contains flour, sugar, egg, and some type of ...
allowed buyers to
hijack a victim's browser session by injecting it into a browser environment. Resources refer to browser-related files found on a user's operating system, such as password storage files.
Economics and impact
Setting up an infostealer operation has become increasingly accessible due to the proliferation of stealer-as-a-service enterprises, significantly lowering financial and technical barriers. This makes it feasible for even less sophisticated cybercriminals to engage in such activities.
In a 2023 paper, researchers from the
Georgia Institute of Technology
The Georgia Institute of Technology (commonly referred to as Georgia Tech, GT, and simply Tech or the Institute) is a public university, public research university and Institute of technology (United States), institute of technology in Atlanta, ...
noted that the hosted stealer market is extremely mature and highly competitive, with some operators offering to set up infostealers for as low as $12.
For the service providers running these stealer operations, the researchers estimated that a typical infostealer operator incurs only a few one-off costs: the license to use the infostealer, which is obtained from a malware developer, and the registration fee for the domain used to host the
command-and-control server. The primary ongoing cost incurred by these operators is the cost associated with hosting the servers. Based on these calculations, the researchers concluded that the stealer-as-a-service business model is extremely profitable, with many operators achieving profit margins of over 90% with revenues in the high thousands of dollars.
Due to their extreme profitability and accessibility, the number of cybersecurity incidents that involve infostealers has risen.
The
COVID-19
Coronavirus disease 2019 (COVID-19) is a contagious disease caused by the coronavirus SARS-CoV-2. In January 2020, the disease spread worldwide, resulting in the COVID-19 pandemic.
The symptoms of COVID‑19 can vary but often include fever ...
post-pandemic shift towards
remote and hybrid work, where companies give employees access to enterprise services on their home machines, has been cited as one of the reasons behind the increase in the effectiveness of infostealers.
In 2023, research by
Secureworks
Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, ranging from Fortune 100 companies to mid-sized businesses in a variety of industries.
It became part of Dell, Dell ...
discovered that the number of infostealer logs, or data exfiltrated from each computer, increased from 2 million to 5 million logs from June 2022 to February 2023 on the Russian Market, the biggest underground cyberforum.
According to
Kaspersky's research in mid-2023, 24% of malware offered as a service are infostealers.
In 2024, infostealers were used to steal 2.1 billion credentials, over 60% of the 3.2 billion credentials stolen from all organizations. Infostealers are heavily utilized because of their low cost, with an average cost of $200 per month in 2024. On February 18, 2025, it was reported that infostealers had compromised email accounts and credentials across multiple US government and military departments, including the FBI.
References
Citations
Sources
*
*
*
*
*
*
*
*
*
*
*
*
{{Portal bar, Internet
Security breaches
Cybercrime
Types of malware
Malware by type
Social engineering (security)
Cyberwarfare