Nearly 4 billion passwords exposed by malware


We saw an increase in InfoSteal Malware in 2024, where hackers used it to steal references, cryptocurrency and other personal data from millions of users. If you remember it, I have reported countless Incidents of an infonneter called Lumma Preying on Android, Windows and even iOS and Mac users.

A new cyber security report now emphasizes that Hackers use Lumma, together with Stealc, Redline and other infonters, infected 4.3 million machines in 2024, which led to an amazing 330 million compromised references.

Security researchers have also observed 3.9 billion references in reference lists that seem to have come from Infeleallogboeken.

Stay protected and informed! Receive security reports and technical tips for experts – sign up now for Kurt’s The Cyberguy Report

hacker

Illustration of a hacker at work (Kurt “Cyberguy” Knutsson)

Infeler-related attacks on the increase in 2024

A Cyber ​​Security Report Due to the threat information platform, Kela discovered a strong increase in Infontal Malware in 2024. Researchers also saw an alarming trend how stolen data were distributed. Large compilations of references, often referred to as “reference lists”, were shared in cyber criminal forums. These lists, mainly from InfoStealer logbooks, contain billions of login data harvested from infected devices.

One of the most striking incidents linked to InfoStealer Malware was the infringement of Snowflake, a cloud data storage provider. In April 2024, threat actors gained access to customer accounts with the help of stolen login details, many of which were obtained through Infelealers. Utilizing weak security practices, such as the absence of multifactor authentication, attackers have extracted valuable data and later tried to sell them on underground markets. The infringement hit at least 165 companies.

What is artificial intelligence (AI)?

The KELA report emphasizes that Hackers who implement LummaStealc, Redline and other infontal players have infected 4.3 million machines, which led to the compromise of 330 million references. Almost 40% of these infected machines contained login data for business systems, including content management platforms, E -mail accounts, Active Directory Federation Services and external desktop environments. In total this was 1.7 million compromised bots and 7.5 million stolen references.

The report also showed that 3.9 billion references were shared in reference lists that seem to have come from Infeler logbooks. The analysis of Kela suggests that nearly 65% ​​of the infected devices were personal computers that saved company references, making them an important target for Infeler Malware.

Hacker at work

Illustration of a hacker at work (Kurt “Cyberguy” Knutsson)

How to remove your private data from the Internet

2025 will not be different

Info standing malware does not go anywhere in 2025. With malware-as-a-service platforms on the rise and infute dealers becoming more advanced, cyber criminals will probably continue to use as a go-to-to-method for stealing references and gaining access to systems.

Law enforcement however, was cut. In 2024, the authorities succeeded in bringing down important parts of the Infontal Ecosystem, including the disturbance of Redline, one of the most used Info Stealers. This showed that international agencies can not only chase the malware developers, but also the networks and underground markets that run these activities.

But like these, the problem is rarely an end. When a large effect of InfoStealer is concluded, others come quickly to take his place. The constant demand for stolen references and the ability of cyber criminals to adjust means that infontal attacks will probably remain a major threat in 2025.

Get Fox Business on the Go by clicking here

person who type on laptop

Illustration of a hacker at work (Kurt “Cyberguy” Knutsson)

Best antivirus for Mac, PC, iPhones and Androids – Cyberguy Picks

Ways to stay safe against InfoSteal Malware

Now that InfoStealer Malware is becoming a growing threat, protecting your data requires a mix of smart security habits and reliable tools. Here are some effective ways to keep your information safe.

1. Switch on two-factor authentication (2FA): Even if your references have been stolen, 2FA Adds an additional layer of security by requiring a second form of verification, such as a code of an authentication app or biometric confirmation. Cyber ​​criminals rely on stolen usernames and passwords to break into accounts, but with 2FA they cannot get access without the extra security step. Make sure you hire 2FA on important accounts such as e-mail, banking and work-related registrations.

2. Use strong antivirus software and be careful with downloads and links: Infeler Malware often spreads through malignant downloads, phishing -e -mails and fake websites. Avoid the downloading of software or files from non-vested sources and always check links before clicking on it. Attackers disguise malware such as legitimate software, game cheats or cracked applications, so it’s best to stick to official websites and app stores for downloads.

The best way to protect yourself against malignant links that install malware, which may have access to your private information, is to have strong antivirus software installed on all your devices. This protection can also warn you about phishing -e -mails and ransomware -scam, so that your personal information and digital assets are kept securely. Buy my choices for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3. Use a password manager: Many Infoestealers focus on saved passwords in web browsers. Use a special password manager instead of trusting your browser to store login details. Get more details about my Best Expert-Reviewed Password managers from 2025 here.

4. Software updated: Cyber ​​criminals operate outdated software to deliver malware. Keep your operating system, browsers and security software up -to -date Ensures that known vulnerabilities are patched. Use automatic updates where possible and install renowned antivirus or end point protection software that can detect and block the threats of InfoStealer before they can jeopardize your system.

How to fight back against debit card hackers who are behind your money

Kurt’s most important collection meal

Given the increase in the warnings for Info Stealer Malware, it is clear that cyber criminals are actively focusing on passwords. Both organizations and individuals are encouraged to strengthen their security measures by making 2FA possible, to monitor the exposure to references and use tools for end point protection. Although no security measure is completely watertight, combining these practices can significantly reduce the risk of victim of Infeler Malware.

Click here to get the Fox News app

Do you think that companies do enough to protect your data against Info -Malware and other cyber threats? Let us know by writing us Cyberguy.com/contact.

For more of my technical tips and security warnings, subscribe to my free Cyberguy report newsletter by going to Cyberguy.com/newsletter.

Ask Kurt a question or let us know what stories you want us to cover.

Follow Kurt on his social channels:

Answers to the most requested Cyberguy questions:

New from Kurt:

Copyright 2025 cyberguy.com. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *