Infostealers explained: Understanding and defeating modern credential theft malware

Key insights

  • Infostealers have stolen 1.8 billion credentials in 2025, driving 86% of breaches through automated credential harvesting
  • Modern variants like Lumma, Acreed, and StealC V2 cost just $200 monthly, democratizing sophisticated attacks
  • Traditional endpoint detection fails against 66% of infostealers, requiring identity-centric defense strategies
  • FIDO2 passkeys, now supported by 93% of accounts, provide the strongest defense against credential theft
  • Organizations must implement 4-hour response windows for suspected infections, though current detection averages 4 days

In an era where digital identities are the keys to our kingdom, a silent epidemic rages across the cyber landscape. Infostealers — sophisticated malware designed to harvest credentials — have stolen 1.8 billion credentials from 5.8 million devices in 2025 alone, representing an 800% increase from previous years. This staggering scale of credential theft now drives 86% of all breaches, fundamentally changing how organizations must approach security.

The gravity of this threat became undeniable in October 2025 when 183 million Gmail credentials flooded underground markets, selling for as little as $10 per account. While not a breach of Google's systems, this massive leak demonstrated how endpoint infections translate into enterprise-scale security disasters. For security professionals defending increasingly complex environments, understanding infostealers isn't optional — it's essential to organizational survival.

What are infostealers?

Infostealers are a specialized category of malware designed to silently extract sensitive information from infected systems, particularly focusing on authentication credentials, session tokens, and personal data. These malicious programs operate stealthily in the background, harvesting passwords stored in browsers, cryptocurrency wallet keys, system information, and active session cookies that bypass multi-factor authentication. Unlike ransomware that announces its presence through encryption, infostealers remain undetected while systematically pillaging digital identities.

The sophistication of modern infostealers extends far beyond simple password theft. These tools extract comprehensive digital profiles including browser histories, autofill data, screenshots, and system configurations. Operating under a Malware-as-a-Service (MaaS) model, criminals can rent access to advanced infostealer platforms for as little as $200 monthly, removing technical barriers to entry. This democratization of cybercrime tools has transformed credential theft from a specialized skill to a commodity service.

The business model behind infostealers reveals why they've become cybercrime's preferred weapon. Stolen credentials flow through a sophisticated underground economy where Initial Access Brokers (IABs) purchase, package, and resell access to compromised accounts. A single corporate credential can fetch thousands of dollars when it provides access to valuable networks. This economic incentive drives continuous innovation in evasion techniques and targeting strategies.

The scale of the infostealer threat

The numbers paint a sobering picture of infostealer proliferation. Research shows 1.8 billion credentials stolen from 5.8 million devices in 2025, with the average breach now costing organizations $4.44 million globally, reaching $10.22 million in the United States. Geographic analysis shows concentrated infections in India (10%) and Brazil (8%), though no region remains untouched.

Law enforcement efforts like Operation Endgame have disrupted major infrastructure, seizing 1,025+ servers and arresting key operators. Yet for every takedown, new variants emerge. The resilience of this ecosystem stems from its decentralized nature and the low barrier to entry provided by MaaS platforms. Organizations implementing Identity Threat Detection and Response (ITDR) solutions report significantly improved detection rates, though the gap between infection and discovery still averages 4 days.

The shift toward Zero Trust architectures reflects the industry's recognition that credential theft is inevitable. Rather than relying solely on prevention, modern security strategies assume compromise and focus on limiting the blast radius of stolen credentials through continuous verification and least-privilege access models.

How infostealers work

Understanding the technical mechanisms of infostealers reveals why traditional security measures often fail. These sophisticated tools employ multiple extraction methods, advanced evasion techniques, and resilient command-and-control infrastructure to maintain persistent access to victim data streams.

The infection chain typically begins with social engineering, exploiting human psychology rather than technical vulnerabilities. Phishing campaigns delivering malicious attachments remain the primary vector, though malvertising and compromised software downloads have surged 700% through initiatives like the ClickFix campaign. Once executed, infostealers immediately begin harvesting stored credentials from browsers, email clients, and password managers while establishing communication with attacker infrastructure.

Modern infostealers employ sophisticated evasion techniques that allow them to bypass security controls. They use process hollowing to hide within legitimate applications, employ anti-analysis tricks to detect virtual machines, and leverage fileless techniques that operate entirely in memory. StealC V2's JSON-based command-and-control protocol exemplifies this evolution, dynamically adjusting its behavior based on the target environment while maintaining encrypted communication channels resistant to network monitoring.

The extraction process follows a methodical sequence:

  1. System profiling — Gathering hardware specs, installed software, and security tools
  2. Browser harvesting — Extracting saved passwords, cookies, and autofill data
  3. Application targeting — Stealing credentials from email clients and messaging apps
  4. Wallet discovery — Searching for cryptocurrency keys and seed phrases
  5. Session hijacking — Capturing active authentication tokens
  6. Data packaging — Compressing stolen information into encrypted archives
  7. Exfiltration — Transmitting data to command-and-control servers
  8. Market preparation — Formatting credentials for underground sale

The Malware-as-a-Service (MaaS) ecosystem

The MaaS model has transformed infostealers from custom tools to commercial products. For $200 monthly, criminals gain access to sophisticated platforms including customizable malware builders, bulletproof hosting, automated campaign management, and real-time statistics dashboards. This subscription model provides continuous updates, ensuring malware stays ahead of detection signatures.

Platform operators handle the technical complexity while "customers" focus on distribution. Features like modular architecture allow attackers to select specific capabilities, reducing file sizes and detection profiles. Acreed's 2025 launch exemplifies this trend, offering customizable modules for browser theft, cryptocurrency targeting, and corporate credential harvesting. The competitive marketplace drives innovation, with vendors racing to add features like multi-monitor screenshots and improved anti-analysis capabilities.

The economic efficiency of MaaS platforms explains their explosive growth. Compare the $200 monthly cost to potential returns of thousands per compromised corporate account, and the ROI becomes clear. This accessibility has expanded the threat actor pool from sophisticated groups to opportunistic criminals, multiplying the attack surface organizations must defend.

Distribution methods and infection vectors

Distribution strategies have evolved beyond traditional email attachments. The ClickFix campaign demonstrates sophisticated social engineering, displaying fake error messages prompting users to "fix" issues by running malicious PowerShell commands. These campaigns exploit trusted contexts — software update prompts, browser notifications, and system alerts — to bypass user skepticism.

Supply chain attacks represent an emerging vector, with attackers compromising legitimate software to distribute infostealers. The Snowflake incident, involving six different infostealer strains, compromised 165 environments through infected third-party tools. Search engine optimization (SEO) poisoning drives traffic to malicious sites hosting fake software cracks and game modifications, particularly targeting younger demographics less aware of security risks.

Malvertising campaigns purchase legitimate advertising space to distribute infostealers, leveraging trusted platforms to reach victims. These ads often impersonate popular software, leading to convincing download pages hosting malicious payloads. Geographic and demographic targeting ensures campaigns reach valuable targets — finance professionals during tax season, gamers during major releases, or students during exam periods.

Types of infostealers

The infostealer landscape features diverse variants, each with unique capabilities and target profiles. Understanding these differences helps security teams prioritize detection strategies and allocate defensive resources effectively.

The market has witnessed significant disruption in 2025, with law enforcement operations dismantling established players while new variants rapidly fill the vacuum. This constant evolution challenges security teams to maintain current threat intelligence while preparing for emerging threats. Malware analysis reveals common patterns across variants, though each family maintains distinct characteristics that require tailored detection approaches.

Competition drives innovation, with developers racing to add features that differentiate their products. Advanced evasion techniques, expanded target applications, and improved data exfiltration methods appear regularly in updates. Threat intelligence platforms track these developments, providing security teams with indicators of compromise and behavioral patterns essential for detection.

Lumma Stealer - Market leader

Lumma Stealer dominates the market with 1,200 monthly searches, reflecting its widespread adoption among cybercriminals. This variant has experienced a 369% increase in detections despite Microsoft and Cloudflare's seizure of 2,300 associated domains in May 2025. Its resilience stems from a distributed infrastructure and rapid adaptation to law enforcement actions.

Technical analysis reveals Lumma's sophisticated capabilities including advanced browser extraction targeting Chrome, Firefox, and Edge password stores. The malware employs multiple anti-analysis techniques, detecting virtual machines and sandbox environments to evade automated analysis. Its modular architecture allows operators to customize payloads, adding or removing features based on target profiles. Communication occurs through encrypted channels using domain generation algorithms (DGAs) that complicate takedown efforts.

Lumma's success reflects its balance of sophistication and usability. The management panel provides real-time statistics, automated log parsing, and built-in monetization tools. Operators can filter stolen credentials by value, automatically identifying high-value targets like corporate accounts or cryptocurrency wallets. This efficiency has made Lumma the preferred choice for both sophisticated groups and entry-level criminals.

Emerging threats in 2025

Three new variants have emerged as significant threats in 2025, each bringing unique capabilities to the infostealer ecosystem:

Acreed Stealer launched in early 2025 with a modular design allowing customized feature selection. Priced competitively at $200 monthly, Acreed targets browser credentials, cryptocurrency wallets, and system information. Its architecture emphasizes stealth, using legitimate Windows processes for injection and avoiding common detection patterns. Distribution primarily occurs through phishing and malvertising campaigns targeting enterprise users.

StealC V2 (Monster V2) released version 2.2.4 in November 2025, incorporating lessons learned from law enforcement takedowns. The $200 monthly subscription includes JSON-based command-and-control protocols for improved evasion, multi-monitor screenshot capabilities for capturing sensitive information, and enhanced browser data extraction including session restoration files. StealC V2's anti-analysis techniques detect and evade modern EDR solutions, contributing to the 66% bypass rate observed across infostealers.

Nexus Stealer has rapidly gained market share following RedLine's disruption, focusing on advanced credential harvesting and session token theft. Its capabilities include targeting of password manager databases, extraction of two-factor authentication backup codes, and sophisticated cookie theft bypassing site isolation. Nexus represents the next generation of infostealers, incorporating machine learning for target prioritization and automated exploitation of stolen credentials.

Variant Price/Month Key Features Distribution Methods
Lumma $200-500 Advanced anti-analysis, DGA domains, modular architecture Phishing, malvertising, SEO poisoning
Acreed $200 Customizable modules, Windows process injection, enterprise focus Phishing, malvertising
StealC V2 $200 JSON C2 protocol, multi-monitor capture, EDR evasion ClickFix, software cracks
Nexus $150-300 Password manager targeting, 2FA bypass, ML prioritization Compromised software, supply chain
RedLine Disrupted Legacy variant, widespread logs still circulating Various (discontinued)
Agent Tesla $50-200 Keylogging, screenshot capture, email theft Email attachments, macros

Infostealers in practice

Real-world incidents demonstrate how infostealers translate into organizational disasters. These cases reveal attack patterns, impact scales, and the cascading failures that follow credential compromise.

The October 2025 leak of 183 million Gmail credentials exemplifies the massive scale of modern credential theft. Harvested through Synthient Stealer and other variants, this 400GB dataset flooded underground markets, driving credential prices to historic lows of $10 per account. Google's response — mass password resets and enhanced monitoring — highlighted the reactive nature of current defenses against proactive attackers.

The Snowflake supply chain compromise demonstrated how infostealers enable complex, multi-stage attacks. Six different infostealer strains compromised developer machines, stealing credentials later used to access 165 customer environments. The attack bypassed traditional security boundaries, exploiting trusted relationships between vendors and customers. This incident forced a industry-wide reevaluation of cloud security practices, particularly around third-party access management.

Operation Endgame's November 2025 takedown revealed the infrastructure supporting infostealer operations. The seizure of 1,025+ servers and 20 domains disrupted access to 100,000+ compromised cryptocurrency wallets. Yet within days, new infrastructure emerged, demonstrating the resilience of the infostealer ecosystem. Law enforcement's cat-and-mouse game with operators continues, with each takedown providing temporary relief before variants adapt and resurface.

The credential-to-ransomware pipeline

Infostealers serve as the first stage in many ransomware attacks, with stolen credentials sold to specialized groups for exploitation. The HellCat ransomware campaign exemplified this pipeline, using JIRA credentials obtained from stealer logs to gain initial access. Once inside, attackers escalated privileges, moved laterally, and deployed ransomware, causing millions in damages.

Initial Access Brokers (IABs) facilitate this ecosystem, purchasing credentials from infostealer operators and reselling access to ransomware groups. Prices vary based on target value — a Fortune 500 credential might fetch $50,000, while small business access sells for hundreds. This specialization allows each group to focus on their expertise: stealing credentials, brokering access, or executing ransomware attacks.

The timeline from credential theft to ransomware deployment averages 4-7 days, though sophisticated groups can move faster. This window represents the critical period for detection and response. Organizations detecting and responding to credential theft within hours can prevent escalation, while those taking days face inevitable compromise. The 4-day average detection time means most organizations discover infections after attackers have already monetized stolen data.

Detecting and preventing infostealers

Effective defense against infostealers requires layered strategies combining technical controls, process improvements, and user education. The 66% endpoint detection bypass rate demonstrates why organizations cannot rely on single security layers.

Detection strategies must account for infostealers' stealthy nature and polymorphic capabilities. Modern variants employ sophisticated evasion techniques including process hollowing, living-off-the-land tactics, and encrypted communications. Behavioral analysis offers more reliable detection than signature-based approaches, focusing on anomalous activity patterns rather than specific malware characteristics. Memory forensics can reveal infostealers operating entirely in RAM, while network detection and response (NDR) solutions identify suspicious data exfiltration patterns.

Prevention requires addressing both technical vulnerabilities and human factors. While technological controls provide essential protection, user behavior remains the primary infection vector. Organizations must balance security requirements with usability, ensuring protection measures don't impede productivity. The rapid evolution of infostealer techniques means yesterday's defenses may fail against today's threats, requiring continuous adaptation and improvement.

Effective detection methods include:

  1. Behavioral analysis monitoring for credential access patterns
  2. Memory forensics identifying malicious code injection
  3. Network traffic analysis detecting C2 communications
  4. File integrity monitoring catching unauthorized modifications
  5. Browser extension auditing identifying malicious additions
  6. API call monitoring tracking suspicious system interactions
  7. Registry analysis finding persistence mechanisms
  8. Cloud activity monitoring detecting anomalous authentication
  9. SIEM correlation aggregating security events across systems

Why traditional EDR isn't enough

Endpoint detection and response (EDR) solutions face significant challenges detecting modern infostealers. The 66% bypass rate reflects sophisticated evasion techniques specifically designed to defeat endpoint security. Infostealers use legitimate Windows APIs for credential extraction, making behavior appear normal to EDR solutions. They operate briefly, extracting data and terminating before detection algorithms flag suspicious activity.

Modern variants employ multiple anti-EDR techniques including direct system calls bypassing API hooks, process injection into trusted applications, and kernel-level operations avoiding user-mode monitoring. They detect virtualization and sandbox environments, remaining dormant when under analysis. Some variants specifically target EDR processes, attempting to disable or corrupt security tools before beginning credential extraction.

The solution isn't abandoning EDR but augmenting it with complementary technologies. Identity Threat Detection and Response (ITDR) solutions focus on identity-based anomalies rather than endpoint behaviors. Network detection identifies data exfiltration regardless of endpoint evasion. Deception technologies create honey credentials that trigger alerts when accessed. This defense-in-depth approach addresses EDR limitations while maintaining endpoint visibility.

Post-infection response procedures

Speed defines successful incident response to infostealer infections. The 4-hour service level agreement (SLA) for credential reset represents best practice, though achieving this requires preparation and automation. Every hour of delay increases the likelihood of credential monetization and secondary attacks.

Immediate response actions must focus on containment and credential invalidation. This includes isolating infected systems from network access, resetting all potentially compromised passwords, revoking active sessions and authentication tokens, and reviewing access logs for suspicious authentication. Organizations should notify affected users and partners while preserving forensic evidence for investigation. Implementing additional authentication factors temporarily and monitoring for credential reuse attempts helps prevent further compromise.

Recovery extends beyond technical remediation to include process improvements and user education. Organizations must analyze infection vectors to prevent recurrence, update security controls based on lessons learned, and enhance monitoring for similar attack patterns. User training should address specific social engineering tactics used while security teams should revise incident response procedures based on experience. Dark web monitoring for leaked credentials and regular security assessments help identify ongoing risks.

Infostealers and compliance

Regulatory frameworks increasingly recognize credential theft as a critical compliance issue. Organizations face mounting pressure to implement comprehensive controls protecting authentication systems and user identities.

The MITRE ATT&CK framework maps infostealer behaviors across multiple techniques including T1003 (OS Credential Dumping), T1555 (Credentials from Password Stores), T1539 (Steal Web Session Cookie), T1056 (Input Capture), and T1005 (Data from Local System). This mapping enables organizations to align defensive strategies with recognized threat patterns. Compliance frameworks reference these techniques when defining security requirements.

NIST Cybersecurity Framework 2.0 addresses infostealer threats through multiple control families. PR.AC (Identity Management and Access Control) requires strong authentication and credential protection. DE.CM (Security Continuous Monitoring) mandates detection capabilities for credential theft. RS.AN (Analysis) requires investigation procedures for suspected compromises. These controls form the foundation of regulatory compliance across industries.

Framework Control Mapping Evidence Required
MITRE ATT&CK T1003 OS Credential Dumping Detection rules, response procedures
MITRE ATT&CK T1555 Password Store Access Browser security, credential monitoring
NIST CSF 2.0 PR.AC-1 Identity Management MFA deployment, passkey adoption
NIST CSF 2.0 DE.CM-7 Malicious Code Detection EDR/ITDR implementation
EU NIS2 Article 21 Incident Handling 24-hour notification, 72-hour report
PCI DSS 4.0 Req 8 User Authentication Strong passwords, MFA requirements
ISO 27001 A.9.4.2 Password Management Secure storage, complexity requirements

The EU NIS2 directive, effective October 2024, specifically addresses credential breaches. Organizations must report significant incidents within 24 hours, with detailed reports following within 72 hours. Credential theft affecting critical services triggers mandatory notifications to national authorities. Penalties for non-compliance reach 2% of global annual turnover, emphasizing the financial risks of inadequate controls.

Modern approaches to defending against infostealers

The security industry has evolved beyond traditional perimeter defenses, recognizing that credential theft requires identity-centric strategies. Modern approaches assume breach and focus on limiting impact through architectural changes and emerging technologies.

Zero Trust architecture fundamentally changes how organizations approach credential security. Rather than trusting authenticated users implicitly, Zero Trust continuously verifies identity and authorization. This approach limits stolen credentials' value by requiring additional verification for sensitive actions. Microsegmentation contains breaches, preventing lateral movement even with valid credentials. The principle of least privilege ensures compromised accounts access only necessary resources.

Automated dark web monitoring has become essential for proactive defense. Services continuously scan underground markets for organizational credentials, providing early warning of compromises. Integration with identity management systems enables automatic response when credentials appear online. Machine learning algorithms identify patterns suggesting targeted attacks, while threat intelligence feeds provide context about emerging campaigns. This proactive stance shifts organizations from reactive to predictive security postures.

Device Bound Session Credentials (DBSC) represent the next evolution in authentication security. This emerging technology cryptographically binds session tokens to specific devices, preventing replay attacks even if cookies are stolen. Early implementations show promising results, though widespread adoption awaits browser and application support. FIDO2 passkeys, now supported by 93% of user accounts, provide immediate protection through phishing-resistant authentication that infostealers cannot compromise.

How Vectra AI thinks about infostealer detection

Vectra AI approaches infostealer detection through an identity-centric lens, combining network and identity signals to identify credential theft attempts before exfiltration occurs. Rather than relying on malware signatures that quickly become obsolete, Attack Signal Intelligence™ focuses on behavioral anomalies indicating compromise. This methodology detects unknown variants and zero-day threats by identifying the consistent behaviors all infostealers must exhibit — accessing credential stores, establishing command channels, and exfiltrating data. By correlating identity anomalies with network patterns, security teams gain visibility into attacks that bypass traditional endpoint protection.

Future trends and emerging considerations

The cybersecurity landscape continues evolving rapidly, with infostealers at the forefront of emerging challenges. Over the next 12-24 months, organizations should prepare for several key developments that will reshape how we defend against credential theft.

Artificial intelligence is transforming both attack and defense capabilities. Attackers leverage AI for crafting convincing phishing messages, automatically identifying high-value targets in stolen datasets, and developing polymorphic malware that adapts to defensive measures. Defenders counter with AI-powered behavioral analysis, automated threat hunting, and predictive models identifying likely targets. This AI arms race will accelerate through 2026, with advantages shifting between attackers and defenders as technologies mature.

Quantum computing poses a longer-term threat to current encryption methods protecting stored credentials. While practical quantum computers remain years away, organizations must begin preparing for "harvest now, decrypt later" attacks where adversaries steal encrypted data for future decryption. Post-quantum cryptography standards, finalized by NIST in 2024, require implementation across authentication systems. Organizations should inventory cryptographic dependencies and develop migration plans for quantum-resistant algorithms.

Regulatory pressure will intensify following high-profile breaches attributed to credential theft. The EU's NIS2 directive sets precedents other regions will likely follow, with mandatory breach notifications and substantial penalties for inadequate controls. The proposed US federal privacy legislation includes provisions specifically addressing credential protection and identity verification. Organizations operating internationally face a complex patchwork of requirements necessitating comprehensive identity security programs.

Investment priorities for the next 24 months should focus on three critical areas. First, organizations must accelerate passkey adoption, targeting 100% coverage for privileged accounts by Q2 2026. Second, ITDR deployment should expand beyond pilot programs to production implementation covering all identity stores. Third, Zero Trust initiatives must move from conceptual frameworks to operational architectures with continuous verification and microsegmentation.

The convergence of IT and OT environments creates new attack surfaces for infostealers. Industrial control systems increasingly connect to corporate networks, exposing operational technology to credential theft risks. A compromised engineer's credentials could provide access to critical infrastructure, creating insider threat scenarios with potential for physical damage beyond data theft. Organizations must extend identity security programs to encompass OT environments, implementing specialized controls for industrial systems.

Conclusion

The infostealer epidemic represents a fundamental shift in the cybersecurity landscape, where traditional perimeter defenses and endpoint protection prove insufficient against credential-focused attacks. With 1.8 billion credentials stolen in 2025 alone and 86% of breaches involving credential theft, organizations can no longer treat identity security as secondary to network protection. The emergence of sophisticated variants like Lumma, Acreed, and StealC V2, available for just $200 monthly, has democratized advanced attack capabilities while the 66% EDR bypass rate exposes critical gaps in current defenses.

Success against infostealers requires embracing identity-centric security strategies that assume compromise rather than perfect prevention. Organizations must accelerate adoption of FIDO2 passkeys, now supported by 93% of accounts, while implementing ITDR solutions that detect credential theft attempts regardless of malware variants. The 4-hour response window for credential reset, though challenging against the current 4-day detection average, represents the critical difference between contained incidents and catastrophic breaches. Zero Trust architectures that continuously verify identity and limit credential scope provide essential architectural defenses.

Looking forward, the convergence of AI-enhanced attacks, quantum computing threats, and regulatory requirements will reshape how organizations approach credential security. The next 12-24 months will prove critical as organizations race to implement passkeys, deploy ITDR platforms, and operationalize Zero Trust before threat actors leverage emerging technologies. Security leaders must shift from reactive responses to proactive strategies, treating identity as the new perimeter while preparing for an environment where every credential represents a potential breach vector.

Take action today by assessing your organization's credential attack surface and exploring how modern identity-centric approaches can strengthen your defense against the evolving infostealer threat.

More cybersecurity fundamentals

FAQs

What's the difference between infostealers and other malware?

Can antivirus software detect infostealers?

What happens to stolen credentials?

How quickly should we respond to an infostealer infection?

Do passkeys protect against infostealers?

How do infostealers bypass multi-factor authentication?

What makes newer variants like Acreed and StealC V2 more dangerous?