Botnets Are Dead, Long Live Infostealers (A Comparison)

The landscape of cyber threats has been shifting dramatically in recent years, with a notable transition from traditional botnets to a more insidious form of malware: Infostealers.

According to Hudson Rock’s cybercrime intelligence database, which tracks historical data on Infostealer infections, there have been 27,500,000 recorded instances of these attacks.

This staggering number highlights the growing prevalence and danger of infostealers in the world of cybercrime.

The Decline of Botnets

Botnets, once the dominant force in cybercrime, have seen a decline in prominence. These networks of compromised computers, controlled by cybercriminals, were notorious for their use in distributed denial-of-service (DDoS) attacks, spam email distribution, and large-scale data theft. High-profile botnets such as Necurs, Gameover Zeus, and Conficker wreaked havoc across the globe, infecting millions of machines and causing billions in damages.

However, several factors have contributed to the decline of traditional botnets:

  1. Enhanced Cybersecurity Measures: Improved detection and prevention technologies, along with coordinated efforts by law enforcement agencies and cybersecurity firms, have led to the takedown of many major botnets.
  2. Legal and Technical Actions: Coordinated international actions, such as the dismantling of the Necurs botnet by Microsoft and its partners, have significantly disrupted botnet operations.
  3. Shift in Cybercriminal Strategies: Cybercriminals have increasingly turned to more covert and financially lucrative methods, such as ransomware and infostealers.

The Rise of Infostealers

Infostealers have emerged as the preferred tool for cybercriminals due to their efficiency and profitability. These malware variants are designed to stealthily infiltrate systems and exfiltrate sensitive information, such as login credentials, financial data, and personal information. The stolen data is then sold on the dark web or used for further cyber attacks.

Key Factors Driving the Popularity of Infostealers:

  1. Low Detection Rates: Infostealers often operate quietly in the background, making them difficult to detect. They can evade traditional antivirus software and remain undetected for long periods.
  2. High Return on Investment: The data harvested by infostealers is highly valuable. Login credentials, for example, can be sold to multiple buyers, providing a high return on investment for cybercriminals.
  3. Ease of Distribution: Infostealers can be distributed through various vectors, including phishing emails, malicious websites, and software exploits. This versatility makes them easy to deploy on a large scale.

Infostealers vs. Botnets: A Comparison

When comparing the historical impact of Windows botnets to the recent surge in Infostealer infections, the numbers speak for themselves. Botnets such as Necurs, Gameover Zeus, and Conficker had infection numbers in the millions, with Necurs being one of the largest at 9 million infections. In contrast, Infostealer infections have reached an unprecedented 27,500,000 cases according to Hudson Rock’s database. This threefold increase highlights the shift in cybercriminal tactics and the growing prominence of Infostealers in the cyber threat landscape.

Case Studies Highlighting the Impact of Infostealers

Recent incidents underscore the severe consequences of infostealer infections:

  • Healthcare Sector Breach: A single compromised Citrix credential resulted in a $22,000,000 ransom demand, demonstrating the high stakes of Infostealer-related breaches.
  • Airbus Incident: Cybercriminal “USDoD” leaked sensitive data from Airbus, exposing personal information of 3,200 vendors. The breach was traced back to an employee at Turkish Airlines whose computer was infected with RedLine Infostealing malware.
  • Orange Employee Incident: An infostealer infection of an Orange employee led to disruptions in Border Gateway Protocol (BGP) routing, highlighting the far-reaching implications of these attacks.

As Infostealers continue to evolve and become more sophisticated, organizations must remain vigilant and adopt robust cybersecurity measures. The shift from botnets to infostealers represents a new era in cyber threats, one that requires adaptive strategies and proactive defense mechanisms to protect sensitive information and maintain cybersecurity.

To learn more about how Hudson Rock protects companies from imminent intrusions caused by info-stealer infections of employees, partners, and users, as well as how we enrich existing cybersecurity solutions with our cybercrime intelligence API, please schedule a call with us, here: https://www.hudsonrock.com/schedule-demo

We also provide access to various free cybercrime intelligence tools that you can find here: www.hudsonrock.com/free-tools

Thanks for reading, Rock Hudson Rock!

Follow us on LinkedIn: https://www.linkedin.com/company/hudson-rock

Follow us on Twitter: https://www.twitter.com/RockHudsonRock

Don’t Stop Here

More To Explore

Infostealers Webinar – Hudson Rock

Learn about Infostealers with actual real life breaches caused by Infostealer infections with Leonid Rozenberg, Hudson Rock’s Head of Partnerships & Integrations. To discover how

favicon__1_ removebg-png

BE THE FIRST TO KNOW

Stay informed with the latest insights in our Infostealers weekly report.

Receive immediate notification if your email is involved in an infostealer infection.

No Spam, We Promise

favicon__1_ removebg-png

BE THE FIRST TO KNOW

Stay informed with the latest insights in our Infostealers weekly report.

Receive immediate notification if your email is involved in an infostealer infection.

No Spam, We Promise