Monday, May 19, 2025
HomeCyber AttackInfostealer Attacks Surge 84% Weekly Through Phishing Emails

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

Published on

SIEM as a Service

Follow Us on Google News

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest IBM X-Force report.

This sharp increase not only signals a shift in attack strategies but also underscores the growing sophistication of cyber adversaries employing new tactics to compromise data security.

Phishing as a Shadow Vector for Data Theft

Phishing emails have long been a favored tool for cybercriminals to infiltrate organizational networks, but recent developments show a pivot towards using these emails to deliver infostealers rather than traditional ransomware.

- Advertisement - Google News

Infostealers are designed to covertly gather sensitive information such as login credentials, financial details, and personal data without the user’s knowledge.

The report highlights that attackers are increasingly leveraging legitimate-looking email attachments or deceptive links to distribute these malicious payloads.

Notably, the use of infostealers like AgentTesla, FormBook, and Strela Stealer has not only increased in frequency but also in the sophistication of the delivery methods.

The Role of Cloud Services in Phishing Campaigns

A significant contributor to this surge in infostealer distribution is the exploitation of cloud hosting services.

Attackers utilize the trust associated with these platforms to mask malicious activity, making it harder for security systems to detect threats.

Services like Microsoft Azure Blob Storage and others have been co-opted to host phishing sites or deliver malware, leveraging the credibility of cloud providers to lower the guard of potential victims.

This method has particularly impacted regions like Latin America, where phishing campaigns have ramped up, taking advantage of the trust in these cloud infrastructures.

Cybercriminals are not only increasing the distribution of infostealers but are also refining their techniques.

Techniques such as SEO poisoning, where attackers manipulate search engine results to promote malicious content, and malvertising, where harmful ads are served to unsuspected users, are becoming more prevalent.

These methods help in deploying infostealers under the guise of legitimate software or updates, particularly targeting regions with less robust cybersecurity measures.

For organizations, defending against these evolving attacks requires a multi-faceted approach.

Enhancing employee training on recognizing phishing attempts, implementing robust multifactor authentication (MFA), and maintaining vigilance over unusual system behavior are crucial steps.

Furthermore, organizations need to leverage AI-powered tools for real-time threat detection and response, adapting to the pace at which these threats evolve.

The dramatic increase in infostealer attacks via phishing emails is a stark reminder of the dynamic nature of cyber threats.

As attackers continue to innovate, organizations must remain proactive, integrating new security measures and adapting to the complex landscape of cybercrime.

This trend not only challenges current security protocols but also calls for a collective effort in cybersecurity preparedness and resilience.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide

Security researcher has revealed a robust method for gathering threat intelligence on Cobalt Strike...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated...