Infostealers – The Risk Continues to Grow

Infostealers – The Risk Continues to Grow

Over recent years, Info stealer malware, also called infostealers, has grown as a formidable adversary for businesses worldwide, particularly in Australia. These malicious software programs are designed to infiltrate networks, stealthily collect sensitive data, and transfer it to cybercriminals who use it for financial gain, espionage, or other illicit activities. As Australian enterprises increasingly rely on digital infrastructure for their operations, the threat posed by infostealers continues to grow, making the importance of understanding their severity for small, medium, and large businesses very high. Due to the nature of the threat and the speed at which it evolves, engaging a cybersecurity professional is one of the most effective ways to mitigate these risks and protect sensitive information. In this article we will provide a basic introduction, explore how info stealer malware works and outline some key activities businesses can do to try and mitigate the risk they pose.

This type of threat has gained prominence due to its stealthy nature and the extensive range of sensitive data it targets. The malware focuses on collecting various forms of information, including login credentials, financial details, personal identification information, and corporate data and is often delivered through phishing attacks, malicious downloads, or software vulnerabilities. Infostealers can operate silently and without immediate detection, within an organisation’s network, collecting data and enumerating the infected network for further vulnerabilities. The rise of remote work and cloud-based services has played a key role in the increased exposure of businesses to these types of threats. Cybercriminals are exploiting the changes in business operations to deploy malware that targets weaknesses in remote access solutions, collaboration platforms, and cloud services. For medium to large enterprises who are moving to more digital operation, with growing and or complex networks, and a vast array of digital assets, the potential damage from info stealer malware can be substantial.

The malware leverages several common methods to infiltrate a system and collect sensitive and secure information that is exposed on the network.

  • Keylogging: The malware records keystrokes to capture usernames, passwords, and any other information entered by users. All keystrokes are recorded and stored without the users’ knowledge.
  • Screen Capturing: Screenshots are taken periodically or upon specific user actions, allowing attackers to capture visual information such as credentials or sensitive documents. It is important to note that in some cases copy and paste data can also be access and captured, this is called Clipboard hijacking.
  • Web Browser Data Extraction: The malware extracts saved passwords, cookies, and autofill data from web browsers, providing access to user accounts and financial information.
  • System and File Access: The malware can search for and exfiltrate specific files, documents, or system information, including network configurations, to aid further attacks or espionage.
  • Hijacking Email Threads: Some advanced variants of infostealer malware can hijack entire email threads, impersonating legitimate communication to propagate further attacks.

Once collected, the stolen information is typically transmitted to a remote server controlled by the attacker, once the data has left the infected business’ network, there is no chance of recovery and very little chance of containment. Cybercriminals may use this data for direct financial gain, identity theft, corporate espionage, or to facilitate subsequent attacks, such as ransomware. They may also sell the information on the dark web, putting a business’s reputation and financial health at further risk. The impact of an info stealer malware attack can be far-reaching, exposing vast amounts of sensitive data. We have written a number of blog articles discussing the potential outcomes of a data breach, but the consequences bear another quick summary.

Data Breach and Financial Loss

The theft of sensitive data, including customer information, intellectual property, and financial records, is an immediate and critical risk post exposure. The result could be significant financial loss through unauthorised transactions, fraudulent activities, and theft of funds. Businesses may also face penalties and fines if they fail to comply with Australian data protection regulations, such as the Privacy Act 1988 and the Notifiable Data Breaches (NDB) scheme.

Reputation Damage

Loss of customer trust is a common outcome, and very difficult to regain, as clients and partners may no longer feel confident in the company’s ability to safeguard their data. Negative publicity following a breach can also lead to loss of business opportunities, a decline in market competitiveness, and potentially long-term impacts on brand reputation, all again impacting the bottom line of the business.

Business Disruption

The theft of login credentials can enable attackers to gain unauthorised access to critical systems, leading to further exploitation, such as ransomware attacks. One outcome may be the business being forced to shut down systems, disconnect affected devices, and conduct extensive investigations to identify and eradicate the threat. Alternatively, the attacker can also force system shutdowns and lockouts if they gain deep enough administrative privileges. The time, effort, and financial investment required for recovery can be considerable, resulting in lost productivity and revenue.

Legal and Regulatory Consequences

Australian businesses are subject to stringent data protection regulations. The Notifiable Data Breaches (NDB) scheme mandates that organisations must notify affected individuals and the Office of the Australian Information Commissioner (OAIC) if they experience a data breach likely to result in serious harm. Failure to comply with these regulations can result in significant legal consequences, including fines and penalties. Additionally, businesses may face lawsuits from customers or partners impacted by the breach.

Intellectual Property Theft and Corporate Espionage

Infostealer malware can target not just customer data but also proprietary information and intellectual property, such as trade secrets, research data, and strategic plans. The theft of this information can undermine a business’s competitive advantage and potentially lead to corporate espionage, where attackers sell the stolen data to competitors or use it to sabotage the business.

There are several strategies businesses can employ to help protect against exposure by info stealer malware.

One of the most effective ways to protect against info stealer malware is to engage a professional cybersecurity service. Cybersecurity professionals bring specialised knowledge and experience in threat detection, risk assessment, and implementing protective measures. They can conduct a comprehensive security audit to identify vulnerabilities, provide tailored solutions, and monitor systems for potential threats.

Penetration testing (pen testing) is a proactive security measure that involves simulating real-world cyberattacks to identify and address vulnerabilities within an organisation’s network. Internal or external cybersecurity professionals can conduct regular pen tests to assess the security posture of an enterprise and identify weak points that may be exploited by info stealer malware. This process provides invaluable insights into potential entry points for attackers and helps businesses strengthen their defences.

A very easy to implement protection is multifactor authentication (MFA). The addition of MFA adds a layer of security by requiring users to provide multiple forms of verification before accessing sensitive systems. Even if an attacker manages to steal a password, MFA can prevent unauthorised access, significantly reducing the risk posed by info stealer malware.

Since info stealer malware often infiltrates devices through malicious downloads, email attachments, or software vulnerabilities, endpoint security is a critical component of any defence strategy. Businesses should deploy endpoint protection solutions, such as antivirus software, firewalls, and intrusion detection systems, to monitor and protect devices from malware infections. There are excellent products on the market to protect business’ digital traffic, and leveraging a cybersecurity professional can ensure the configure and management of these tools to maximise protection.

Another critical protection all businesses should invest in is comprehensive cybersecurity training for all employees to help them recognise potential threats, such as phishing emails and suspicious attachments. Human error is generally the most common factor in many successful cyberattacks, including those involving info stealer malware. Regular training and simulated phishing exercises can reinforce security best practices and reduce the likelihood of malware infiltration due to user mistakes.

The implementation of network segmentation involves dividing an organisation’s network into isolated segments (areas) to limit the spread of malware should it manages to infiltrate the system. By restricting access to sensitive areas of the network through higher and additional security protocols, businesses can contain potential breaches and prevent attackers from accessing critical assets. Network segmentation is a complex process that requires careful planning, which is why consulting a cybersecurity expert is recommended for proper implementation.

Info stealer malware often exploits software vulnerabilities to gain access to systems. Another very simple strategy is to keep software, operating systems, and applications up to date by developing a strategy and execution plan for regular updating and patching of digital assets. This is essential for closing security gaps and preventing malware infiltration. Having experienced infrastructure and system team members or employing a cybersecurity professional is crucial in establishing a robust patch management process to ensure that all systems are regularly updated with the latest security patches.

The complexity of the modern cybersecurity landscape requires specialised expertise that may not always be available in-house. This is why engaging a professional cybersecurity service is a prudent investment or all businesses. Cybersecurity professionals can provide tailored solutions, conduct regular security assessments, monitor systems for threats, and respond to incidents, thereby offering businesses the comprehensive protection they need to mitigate the risks of info stealer malware.

In an era where data breaches have devastating consequences, investing in professional cybersecurity services is not just a defensive measure, it is a proactive strategy to secure the future prosperity of a business. Partnering with cybersecurity experts, Australian enterprises can strengthen their security posture, comply with regulations, and maintain the trust of their customers and stakeholders. Businesses that are serious about protecting their digital assets, must employ cybersecurity minded team members and or engage a cybersecurity professional to safeguard against the ever-growing threat of info stealer malware.

More Blogs

May 31, 2021

Upgrading from AppLocker to Windows Defender Application Control (WDAC)

Windows Defender Application Control (WDAC), formerly known as Device Guard, is a Microsoft Windows secure feature that restricts executable code, including scripts run by enlightened Windows script hosts, to those that conform to the device code integrity policy. WDAC prevents the execution, loading and running of unwanted or malicious code, drivers and scripts. WDAC also… Continue reading Upgrading from AppLocker to Windows Defender Application Control (WDAC)

Read More
cyber security companies | penetration testing | managed security service provider | cyber security consultant
June 22, 2021

Bypassing LSA Protection (aka Protected Process Light) without Mimikatz on Windows 10

Starting with Windows 8.1 (and Server 2012 R2) Microsoft introduced a feature termed LSA Protection. This feature is based on the Protected Process Light (PPL) technology which is a defense-in-depth security feature that is designed to “prevent non-administrative non-PPL processes from accessing or tampering with code and data in a PPL process via open process… Continue reading Bypassing LSA Protection (aka Protected Process Light) without Mimikatz on Windows 10

Read More
cyber security companies | penetration testing | managed security service provider | cyber security consultant
June 7, 2020

Using Zeek to detect exploitation of Citrix CVE-2019-19781

Using the tool Zeek, formally known as bro, is a high-level packet analysis program. It originally began development in the 1990s and has a long history. It does not directly intercept or modify traffic, rather it passively observes it and creates high-level network logs. It can be used in conjunction with a SIEM to allow… Continue reading Using Zeek to detect exploitation of Citrix CVE-2019-19781

Read More