In 2024, the volume of infostealer attacks distributed through phishing emails has surged by 84% week-on-week, according to IBM X-Force. This sharp increase reflects a significant shift in cybercriminal strategies, with attackers moving away from traditional ransomware and focusing more on infostealers. Infostealers are designed to quietly collect sensitive information like login credentials and financial data, often without the victim’s knowledge. The report notes that attackers are using increasingly sophisticated methods to distribute these malicious payloads, such as disguised email attachments and links.
A key factor driving this surge is the exploitation of cloud hosting services by cybercriminals.
Platforms like Microsoft Azure Blob Storage are being used to host phishing sites and deliver malware, leveraging the trust associated with these services to avoid detection. This approach has proven effective, particularly in regions like Latin America, where phishing campaigns have intensified. Cloud-based phishing campaigns are particularly challenging to combat, as they take advantage of the reputation and credibility of trusted cloud providers.
The methods used to distribute infostealers have also become more advanced. Attackers are now utilizing techniques such as SEO poisoning and malvertising to disguise malicious content as legitimate software or updates. These tactics help infostealers bypass traditional detection systems by masquerading as safe downloads or software upgrades.
This increase in sophistication highlights the growing need for organizations to enhance their defenses, particularly in regions with less robust cybersecurity infrastructures.
In response to these threats, organizations must adopt a multi-layered approach to cybersecurity. Employee training on recognizing phishing attempts, along with the implementation of multifactor authentication (MFA), is crucial. Additionally, businesses should invest in AI-powered tools for real-time threat detection and response to keep pace with the evolving tactics of cybercriminals. As infostealer attacks continue to rise, organizations must remain vigilant and adapt their security measures to stay ahead of these increasingly complex threats.
Reference: