By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    AML & KYC: Addressing Key Challenges for 2023 and Beyond
    20 March 2023
    News Roundup: Confidence in AML Lags, but So Do Budgets
    28 April 2024
    Tax Nexus, Reciprocity & More: Navigating Multistate Payroll Tax Withholding Compliance
    6 November 2024
    Latest News
    US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors
    13 December 2025
    Top 10 Risk & Compliance Trends for 2026
    7 December 2025
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Google Uncovers APT41’s Use of Open Source GC2 Tool to Target Media and Job Sites
    17 April 2023
    ChatGPT’s Data Protection Blind Spots and How Security Teams Can Solve Them
    20 April 2023
    RTM Locker’s First Linux Ransomware Strain Targeting NAS and ESXi Hosts
    27 April 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Watch Live as SpaceX Attempts First Fully Expendable Falcon Heavy Mission After Delay [Update]
    29 April 2023
    This ice-free cooler can last up to 42 hours on one charge — Future Blink
    8 May 2023
    I Tried Cold Showers for a Year. Here’s What Happened…
    18 May 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Can New York City skyscrapers withstand an earthquake?
    6 April 2024
    Hedge fund boss Paul Marshall loses case over silver salvaged from shipwreck
    8 May 2024
    Israel’s raid to free hostages takes ‘horrific’ toll on central Gaza
    9 June 2024
    Latest News
    Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
    16 December 2025
    Client Challenge
    15 December 2025
    At least 2 killed and 8 injured hurt in shooting at Brown University with suspect still at large
    14 December 2025
    Thailand vows to keep fighting Cambodia, despite Trump's ceasefire claim
    13 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Stream episode Cybercrime Wire For Apr. 19, 2023. School District Left Teachers in the Dark. WCYB Digital Radio. by Cybercrime Magazine podcast
    20 April 2023
    Cybercrime News For Apr. 26, 2023. Truman State University Suffers Cyberattack. WCYB Digital Radio
    28 April 2023
    Stream episode Cybercrime Wire For May 6-7, 2023. Weekend Update. WCYB Digital Radio. by Cybercrime Magazine podcast
    6 May 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: Infostealer Garden of Low-Hanging Fruit
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Cyber Security > Infostealer Garden of Low-Hanging Fruit
Cyber Security

Infostealer Garden of Low-Hanging Fruit

webmaster
Last updated: 2024/07/15 at 1:05 PM
webmaster
Share
19 Min Read
SHARE

Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that’s basically the state of things today. Welcome to the infostealer garden of low-hanging fruit.

Over the last few years, the problem has grown bigger and bigger, and only now are we slowly learning its full destructive potential. In this article, we will describe how the entire cybercriminal ecosystem operates, the ways various threat actors exploit data originating from it, and most importantly, what you can do about it.

Let’s start with what infostealer malware actually is. As the name suggests, it’s malware that… steals data.

Depending on the specific type, the information it extracts might differ slightly, but most will try to extract the following:

  • Cryptocurrency wallets
  • Bank account information and saved credit card details
  • Saved passwords from various apps
  • Browsing history
  • Cookies from the browser
  • List of downloaded files
  • Information about the operating system used
  • A screenshot of your desktop
  • Documents grabbed from the filesystem
  • Credentials for Telegram and VPN apps
Infostealer
Example of infostealer log package

And more and more stuff, as the malware developers add additional features over time. As you can imagine, you don’t want this kind of information being leaked on the internet for everyone to see. Nor do you want credentials to your organization’s internal systems being compromised in this way. Yet that’s exactly what’s happening each and every day to thousands of users.

You don’t have to be particularly tech-savvy to spread infostealer malware, nor rich to obtain valuable data stolen by other threat actors. Let’s take a look at how the whole ecosystem works.

You, too, can be a cybercriminal!

An ongoing trend on the dark side of the internet is specialization. While in the past, it was more common for one individual or group to take care of the whole process, nowadays the path to your company assets is paved by many different competing threat actors. These actors specialize in just one part of the “industry” and will happily provide their services to anyone willing to pay, in a true free-market spirit.

An example of the “old way” might be the famous Zeus banking malware. It was developed and spread by the same group of people. Stolen data was also exploited by them, and all proceeds from this criminal enterprise went back to them. There was no way for you, a petty cybercriminal, to make money with their results or even buy the malware itself so that you could spread it on your own.

Well, the market evolved. While there are still actors operating completely on their own, the bar for entering the world of stealing other people’s data is much lower. You, even as an individual, can join the ranks of the cybercrime startup industry. The following positions are now open:

Infostealer
Screenshot of desktop included in the above mentioned package

Dropper Implant Developer / Installs Seller

You will be responsible for developing a small yet important piece of software on which the rest of the “industry” often relies: the malware dropper, or loader if you prefer.

While the infostealer malware file itself tends to be rather large because it contains lots of functionality, the malware dropper has only one goal: bypass the antivirus and create a way for other actors to download their own malicious code to the device.

An example of such a dropper might be the Smoke Loader, operating since 2011 and still adding new functionality to this day. Dropper/loader developers either exploit access obtained with their software themselves or resell it through various darknet forums to others, or both. In darknet lingo, an infected computer is known as an “install,” and there are many “installs services” claiming to provide you with a way to spread your own malware (be it infostealers, cryptominers, or other malicious code) through them. Usually, they will assure you that they sell the “install” to your hands only, but from our experience, this is often not the case, as the “installs service” operators will try to monetize it to the max.

Infostealer
InstallsKey dropper service

One such service, InstallsKey, will sell infected (with their own dropper) computers to you for less than a dollar to 10 bucks, depending on the locality. That’s not exactly dirt cheap, but if you know what you are doing, you will get your “investment” back rather quickly.

Infostealer Malware Developer

The engine of the “industry.” You’ll need several years of experience with programming and preferably a good knowledge of how the Windows OS works. Infostealer malware, often loaded through some kind of dropper as described above, extracts all kinds of potentially valuable information and sends a package containing it to the attacker through some form of communication channel.

A non-comprehensive list of commercially available infostealer malware includes:

  • RedLine (outdated, yet still in use by some)
  • META Stealer (updated fork of RedLine)
  • LummaC2
  • Rhadamanthys
  • Vidar
  • Raccoon Stealer (original author arrested, yet still in use)
  • RisePro
  • StealC
  • Monster Stealer

And there are many, many others. Subscription prices range from dozens to lower hundreds of dollars per month.

Infostealer
LummaC2 stealer offering their services on a russian-speaking darknet forum

Usually, you will receive a “builder” application with which you can create an .exe file that suits your needs, often bypassing most common AV solutions (therefore partially covering the functionality droppers provide). Depending on the type, you’ll receive your victim’s data through a web panel (either self-hosted or provided to you) or Telegram.

Infostealer
Cracked version of META stealer available for free

Crypter developer

Bypassing antivirus for the price of a few beers? Not a problem. Crypter developers will allow you to do just that, so you can focus on… well, whatever it is you are up to.

Infostealer
An example of automated crypter service

A crypter is a piece of code that will pack your very evil .exe file in a way that most common AV solutions won’t notice. Both droppers and infostealers sometimes already include some kind of AV bypassing, but a crypter will add an additional layer so you can achieve even more sinister results.

Traffer teams

Spreading infostealers en masse is a difficult task for a lone hacker, so it’s better to team up with other like-minded individuals! That’s what traffer teams (or трафферы) are for. Organizing through forums and (partially automated) Telegram channels/bots, they will provide you with a turnkey solution to infect unsuspecting internet users looking for an Adobe crack or free Fortnite skins. For a percentage of the crypto you manage to steal, they will provide you with everything you need, from an undetectable stealer to a manual on creating fake YouTube tutorials, which are often used for spreading.

Traffer team manager

Are you a people person? Then you might consider a career as a traffer team manager. You’ll just have to glue together a crypter/infostealer malware of your choice and create a friendly Telegram bot to onboard new workers. There’s some competition, so you should work on your PR and possibly give the workers a bigger share of the cake than they’ll get elsewhere. Still, if you manage to convince enough people to work for you, it’s a pretty good deal.

Infostealer
Traffer team operator explaining their conditions on a russian-speaking darknet forum

Traffer team spreader

Perfect entry-level position. If you are willing to learn new stuff and have no moral barriers.

Select the traffer team with best conditions, onboard using the Telegram bot and you are ready to go. Your job will mostly constitute of creating fake YouTube tutorials or scam pages, that’ll convince your victims to download the infostealer malware build provided to you by the traffer team.

Infostealer
Traffer team Telegram bot, providing the “worker” with prepared malicious files used for infostealer spreading

Depending on the team you choose, you might receive up to 90 % of the crypto you manage to steal, and as a bonus, sometimes even the logs themselves (after they are “worked out” for popular monetization methods by your managers). You can either try some other, less usual monetization methods, or just resell them further, or share them for free to obtain respect from your evil peers.

Log Cloud Operator

Obtain logs from public sources and present them as “unique,” “private,” and your own. Profit. That’s how it usually works. Log Cloud is a service that provides you with a stream of more or less “fresh” logs daily (for a fee, of course), usually in the form of a Telegram channel or a continuously updated MEGA.nz storage.

Infostealer
Log cloud channel on Telegram, offering millions of stealer logs collected (mostly) from other semi-public sources

These logs have usually passed through many hands and are “worked out” for the most popular requests, but they may still contain a golden nugget if you know what you are looking for (also known as a “unique request”).

HackedList.io automatically monitors hundreds of Telegram channels. The observed duplicity rate is rather high:

Infostealer

It’s quantity over quality, but there’s strength in quantity too. Some log clouds have accumulated terabytes of data over the years.

url:log:pass reseller

Terabytes of compressed logs means even more terabytes of raw material. And if the only thing you are looking for is a pair of usernames and passwords for that specific site you want to obtain access to, you don’t even need the whole log package. So a separate segment of the “market” evolved: resellers of .txt files in the format of URL:login:password, created out of the standard log packages. Instead of terabytes, it’s just gigabytes now and you can easily search through it with standard utilities like grep.

Infostealer
An example of url:log:pass service advertisement

Otherwise, url:log:pass resellers operate exactly the same way as log cloud operators, except they have to store and deal with less data. Other services, in the form of both websites and Telegram bots exist, that allow you to search through them, so you don’t even have to know how to use grep or where to obtain this kind of logs.

Infostealer
Automated url:log:pass reseller bot on Telegram

Automated Market Operator

Want truly unique and private logs? Visit an automated log market website! It’ll be much more expensive (yes, the log cloud offers are too good to be true), but you have a chance to be the first one (well, second or third, but that’s still fair) to have that log.

Infostealer
Russian Market, currently the biggest automated darknet marketplace where you can obtain infostealer logs

For $10 or less, threat actors can obtain all kinds of accesses on such platforms, with the added benefit that such a log will be exclusively theirs, at least for some time. In the past, there were three major marketplaces operating simultaneously. After Genesis.Market was taken down in an international law enforcement operation, and 2Easy marketplace development was abandoned, there’s just one major player left: the infamous Russian Market. As of today (13-07-2024), it has 7,266,780 records available for sale, and an unknown but surely large number of logs have already been sold on the platform.

Initial Access Broker

Looking for valid and valuable information in the terabytes of data available through log clouds or automated marketplaces is like looking for a needle in a haystack. But if you manage to find it, it can score you a big sum of money. That’s where initial access brokers step in. They look for (still) valid credentials obtained by infostealer infections and use them to establish footholds in compromised networks. Then, they sell these to anyone willing to pay, often to threat actors like ransomware gangs.

Here’s an example from a well-known darknet forum:

Infostealer

A quick check on HackedList.io reveals that the OWA access most probably originates from an infostealer breach:

Opportunistic Script-Kiddie

There are ransomware gangs, APTs, skilled initial access brokers, and then, of course, there are script-kiddies: the bored youth looking for quick cash or just ways to wreak havoc on the internet.

Publicly (or for a low price) available data from infostealer infections provide them with a great tool to cause lots of damage with little knowledge. You don’t have to know any programming because somebody else already wrote the stealer. You don’t have to know how to spread it because somebody else already did. You don’t even have to manually try the obtained credentials to verify if they work because, yes, you guessed it, somebody else already created a tool to do it for you. So you just pick the low-hanging fruit and cause damage.

An example of tool used to check validity of credentials included in infostealer logs

And no, we are not talking about overtaking Minecraft or Discord servers. LAPSUS$, a hacker group of teenagers aged 16 to 21, managed to steal 780 gigabytes of data from the video game publishing giant Electronic Arts. The same group was behind the Uber hack, where they gained access through a compromised account of an external contractor. In both cases, the root cause was an infostealer infection.

Summary

To sum it up, here’s a fancy diagram:

HackedList.io focuses on all kinds of log dealers and darknet marketplaces and can alert you before the bad guys labeled as attackers in the infographics above can take advantage.

How big the problem actually is and what can you do?

Here are some statistics:

  • we have detected 45,758,943 infected devices in total, of which 15,801,893 had at least one set of credentials included in the leak, over the last 4 years
  • in total, we have identified 553,066,255 URL/username/password combinations
  • we have detected infected devices in 183 countries
  • on average, we identify more than 10000 new victims each day
(bump in February caused by finding a huge leak of older data)

The bad news is, that with such high infection rate, there’s a big probability that your organization was already compromised – the bigger your organization is, the bigger the probability.

The good news is, that you can check for free if it happens – just enter your domain on HackedList.io. And if you want to stay protected, we have a solution for that.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Contents
You, too, can be a cybercriminal!Dropper Implant Developer / Installs SellerInfostealer Malware DeveloperCrypter developerTraffer teamsTraffer team managerTraffer team spreaderLog Cloud Operatorurl:log:pass resellerAutomated Market OperatorInitial Access BrokerOpportunistic Script-KiddieSummaryHow big the problem actually is and what can you do?

You Might Also Like

North Korean Hackers Target Developers with Malicious npm Packages

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article How to Get Kids Focused on Their Online Privacy
Next Article EU AI Act Published in the EU Official Journal – Your Front Page For Information Governance News
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
6 Personalized Stationery Sets for a Fancy Kind of Sentimentality
ARCHITECTURE 16 December 2025
Switzerland to tighten rules on military service for dual nationals
SWITZERLAND 16 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?