“Someone, somewhere his data is running from his devices while speaking,” says Volodymyr Diachenko, co -founder of the Cyblersectiony Consultance Securitydissoryy.
Saraiot Thairat Moment Gety pictures
Experts warn of Internet criminals who have increased their efforts to steal and sell passwords online. The warning comes after the discovery of online data collections that contain billions of open account adopting data.
30 data sets consist of entering login to 16 billion by multiple platforms, including Apple, Google and Facebook, and they were first I mentioned By researchers Cybernews last week.
Exposities have been identified throughout this year by Volodymyr Diachenko, co -founder of discovering consultative security of cybersecurity, suspected of working for multiple parties.
“This is a group of different data collections that have appeared on my radar since the beginning of the year, but they are all shared in a joint structure of URL addresses, login details and passwords,” Diashnko told CNBC.
According to Daichenko, all signs indicate the leaked login information as “Infostealers” – malware that extracts sensitive data from devices, including user names, passwords, credit card information and browser data online.
While the entry login lists are likely to contain many repetitions, as well as outdated and incorrect information, the volume of overwhelming results puts in their quorum the spread of sensitive data on the web.
Dichinco said it should make warnings about how Infostealers become “electronic plague” today. “Someone, somewhere, the data is made of his devices and we are talking.”
Daichenko managed to discover exposed data because their owners temporarily made their team on the web without locking the password. Joint data leaks are often unintentionally discovered by security discovery, but not on the standards that have been seen so far this year.
Infostealer threats to rise
According to Simon Green, the president of Asia, the Pacific and Japan in the Pallo Alto networks, the massive size of the 16 billion exposed credit data is worrisome, but it is not quite surprising for those on the front lines of cybersecurity.
He added: “Many contemporary participants have been designed through advanced evasion techniques, which allows them to overcome the traditional signing security controls, which makes it difficult to discover and stop.”
Thus, there was a high high -level Infostealer attacks. For example, in March, Microsoft that Intelligence revealed Harm Using Infostealers who have influenced nearly one million devices worldwide.
Infostealers usually get victims by deceiving them to download harmful programs, which can be hidden in everything starting from delicious emails to fake websites to search engine ads.
The motivation is usually behind the financial Infostealer attacks, as attackers often look forward to taking on bank accounts, credit cards, coded currency portfolios or identity fraud.
Electronic criminals can use stolen accreditation data and other personal data for purposes such as the formulation of custom wood attacks, individuals or organizations.

According to Palo Alto’s Green, the size and risks of those types of Infostealers increased, thanks to the spread of underground markets that provide “Internet crimes as a service”, on which sellers impose customers on malicious tools, sensitive data and other illegal services online.
Green said: “The electronic crime as a service is the cash and cash factor here. Electronic crime has erected mainly,” Green said.
These markets – which are often hosted on the dark network – create the demand for Internet criminals to steal personal information and then sell them to deception.
In this way, data violations become more than just individual accounts – they represent a “vast network and interconnected identities” that can nourish subsequent attacks.
According to Diachenko, at least some of the login data sets set or will be circulated to fraudsters via the Internet.
Moreover, malware and other resources can be found that can help facilitate Infostealer attacks on those markets.
CNBC has I mentioned On how these tools and services are greatly reduced by technical barriers to ambitious criminals, allowing advanced attacks on a huge global scale.
The report found that the Infostealer attacks grew by 58 % in 2024.
What can be done
It is now fair that most people, at some point, are in contact with the threat of Infostealer, that with the increase in the spread of harmful programs and online use, it is now fair to assume that most people will communicate with the threat of Infostealer.
In addition to the frequent password updates, individuals will need to be more alert about the increasing amount of harmful programs hidden in illegal programs, applications and other downloadable files, as Valzuelaa said. He added that using Authenticity On the accounts it has become more important than ever.
He added that from the company’s perspective, it is important to adopt a “zero confidence structure” that does not constantly befriend the user, but also endorses the device and the user’s behavior.
Governments have also been doing more to rid Infostealing activities in recent months.
In May, the European Internet Crime Center said it was cooperating with Microsoft and Global Companities Break “Lumma” Infostealer, which was called “the most important Infostealer threat in the world.”
https://image.cnbcfm.com/api/v1/image/108163639-1750836374213-gettyimages-2201630088-syz_20501.jpeg?v=1750841507&w=1920&h=1080
Source link