Stealer malware leaked over 2 million bank cards on the dark web

ISLAMABAD: According to Kaspersky Digital Footprint Intelligence, an estimated 2.3 million bank cards have been exposed on the dark web. This assessment is based on an analysis of data-stealing malware log files from 2023 to 2024. On average, one in every 14 infostealer infections results in stolen credit card details. Additionally, nearly 26 million devices have been compromised by infostealers, with more than 9 million cases occurring in 2024 alone.Stealer malware leaked over 2 million bank cards on the dark web

Infostealer malware is designed not only to extract financial information but also to harvest login credentials, cookies, and other sensitive user data. These stolen details are compiled into log files and then circulated within underground dark web communities.

Devices can become infected with an infostealer when a user unknowingly downloads and executes a malicious file, often disguised as legitimate software. This type of malware can spread through phishing links, compromised websites, malicious email attachments, instant messaging apps, and other distribution methods. Both personal and corporate devices are at risk.

“The actual number of infected devices is even greater. Cybercriminals frequently leak stolen data in log files months or even years after the initial breach, meaning that compromised credentials and other sensitive details continue to emerge on the dark web over time.

As a result, the longer the timeframe, the more infections from previous years come to light. We estimate that the total number of devices infected with infostealer malware in 2024 will range between 20 million and 25 million, while for 2023, the estimate falls between 18 million and 22 million,” explained Sergey Shcherbel, an expert at Kaspersky Digital Footprint Intelligence.

In 2024, Redline remained the most prevalent infostealer, responsible for 34% of all infections. However, the most significant rise in infections came from RisePro, which saw its share surge from 1.4% in 2023 to nearly 23% in 2024.

“RisePro is an emerging threat. First detected two years ago, it now appears to be gaining momentum. This malware primarily targets banking card details, passwords, and cryptocurrency wallet data. It often spreads by masquerading as key generators, cracked software, and game modifications,” Sergey Shcherbel elaborated. Another rapidly growing infostealer is Stealc, which first surfaced in 2023 and saw its infection rate climb from nearly 3% to 13%.

In response to the rising threat of infostealers, Kaspersky has launched a dedicated webpage to raise awareness and provide strategies for minimizing associated risks. More details can be found in their report.

If you suspect your bank card details have been compromised due to an infostealer attack, take immediate action: monitor your bank notifications, request a new card, and update your passwords for banking apps and websites. Additionally, enable two-factor authentication and other security measures. Run full system scans on all devices to detect and remove any malware.

Businesses are advised to proactively monitor dark web marketplaces to identify compromised accounts. A detailed guide on setting up monitoring is available here. Using Kaspersky Digital Footprint Intelligence can help organizations track what cybercriminals know about their assets, identify potential attack vectors, and implement protective measures in a timely manner.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *