{"id":1289,"date":"2024-09-30T10:29:55","date_gmt":"2024-09-30T08:29:55","guid":{"rendered":"https:\/\/www.oneytrust.com\/?p=1289"},"modified":"2025-07-11T15:13:14","modified_gmt":"2025-07-11T13:13:14","slug":"infostealers","status":"publish","type":"post","link":"https:\/\/www.oneytrust.com\/pt\/infostealers\/","title":{"rendered":"The Growing Threat of &#8220;Infostealer&#8221; Programs"},"content":{"rendered":"<p>The threat of malicious &#8220;Infostealer&#8221; programs is becoming an increasingly concerning cybersecurity topic. Infostealers are malware designed to steal personal and sensitive information, such as login credentials, passwords, banking data, and any other confidential data stored on an infected device.<\/p>\n\n\n\n<p>Understanding and addressing this type of threat is essential today for anyone using a computer, smartphone, or any other internet-connected device capable of running such programs. These malicious programs spread in various ways, most often by exploiting security vulnerabilities or using social engineering techniques to deceive users into downloading malware.<\/p>\n\n\n\n<p>Once installed on a device, these programs can operate discreetly, stealing information without the user\u2019s knowledge. The risks associated with an infostealer infection are numerous. Beyond personal information theft, users may fall victim to financial fraud, identity theft, or even extortion. Moreover, infostealers can compromise the security of devices and networks, paving the way for other types of malware and causing significant harm to both individuals and businesses.<\/p>\n\n\n<style>.kb-image1289_eb6cb7-aa .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image1289_eb6cb7-aa size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"373\" height=\"342\" src=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg\" alt=\"infosteler malware threat\" class=\"kb-img wp-image-1290\" srcset=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg 373w, https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer-13x12.jpg 13w\" sizes=\"auto, (max-width: 373px) 100vw, 373px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Here are the main types of infostealers:<\/h2>\n\n\n\n<p>At Oneytrust we have teams specialising in Darkweb monitoring. They have observed a rise in the use of cloud storage to share the results collected by infostealers. Millions of login credentials of all kinds are made available to users.<\/p>\n\n\n\n<p>Most of the credentials are presented in ULP format for URL, Login, and Password:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u27a2 https:\/\/accounts.xxx.com\/login:[email]:[password]<\/li>\n\n\n\n<li>\u27a2 https:\/\/auth.xxx.com\/login:[username]:[password]<\/li>\n<\/ul>\n\n\n\n<p>It&#8217;s worth noting that a significant amount of data is accessible for free. When users want full access to the compromised data, they must pay a subscription fee for privileged access.<\/p>\n\n\n\n<p>We have seen that data compromised through infostealers is increasingly being exploited and shared across networks, particularly on Telegram through various groups created by malicious actors.<\/p>\n\n\n\n<p>This data can target specific applications, such as financial management software, e-commerce apps, online gaming apps, and other applications that store personal and financial information. Due to their ability to adapt and evolve, Infostealers can potentially target any system, software, or application that stores or processes sensitive data.<\/p>\n\n\n\n<p>It is therefore crucial for administrators and users of all operating systems and platforms to understand the risks associated with these malicious programs and to implement adequate security measures to protect themselves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Here are essential measures to minimise the impact of this type of attack:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce multi-factor authentication (MFA) wherever critical data is stored.<\/li>\n\n\n\n<li>Implement a password management policy requiring employees to periodically change their passwords.<\/li>\n\n\n\n<li>Train and raise awareness among employees about best practices so they can understand the risks associated with high-risk applications.<\/li>\n\n\n\n<li>Immediately deactivate the accounts of former employees upon their departure.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>The threat of malicious &#8220;Infostealer&#8221; programs is becoming an increasingly concerning cybersecurity topic. Infostealers are malware designed to steal personal and sensitive information, such as login credentials, passwords, banking data, and any other confidential data stored on an infected device. Understanding and addressing this type of threat is essential today for anyone using a computer,&#8230;<\/p>","protected":false},"author":3,"featured_media":1290,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[6,1],"tags":[],"class_list":["post-1289","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-general"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Growing Threat of &quot;Infostealer&quot; Programs - Oneytrust<\/title>\n<meta name=\"description\" content=\"Infostealers are an emerging malware threat with huge risk potential. Oneytrust experts give best advice for users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oneytrust.com\/pt\/infostealers\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Growing Threat of &quot;Infostealer&quot; Programs - Oneytrust\" \/>\n<meta property=\"og:description\" content=\"Infostealers are an emerging malware threat with huge risk potential. Oneytrust experts give best advice for users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oneytrust.com\/pt\/infostealers\/\" \/>\n<meta property=\"og:site_name\" content=\"Oneytrust\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-30T08:29:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-11T13:13:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"373\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julie Breton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie Breton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/\"},\"author\":{\"name\":\"Julie Breton\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\"},\"headline\":\"The Growing Threat of &#8220;Infostealer&#8221; Programs\",\"datePublished\":\"2024-09-30T08:29:55+00:00\",\"dateModified\":\"2025-07-11T13:13:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/\"},\"wordCount\":439,\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg\",\"articleSection\":[\"Expertise\",\"General\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/\",\"url\":\"https:\/\/www.oneytrust.com\/infostealers\/\",\"name\":\"The Growing Threat of \\\"Infostealer\\\" Programs - Oneytrust\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg\",\"datePublished\":\"2024-09-30T08:29:55+00:00\",\"dateModified\":\"2025-07-11T13:13:14+00:00\",\"description\":\"Infostealers are an emerging malware threat with huge risk potential. Oneytrust experts give best advice for users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oneytrust.com\/infostealers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg\",\"width\":373,\"height\":342,\"caption\":\"infosteler malware threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oneytrust.com\/infostealers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oneytrust.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Growing Threat of &#8220;Infostealer&#8221; Programs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oneytrust.com\/#website\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"name\":\"Oneytrust\",\"description\":\"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.\",\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oneytrust.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oneytrust.com\/#organization\",\"name\":\"Oneytrust\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"width\":171,\"height\":40,\"caption\":\"Oneytrust\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\",\"name\":\"Julie Breton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"caption\":\"Julie Breton\"},\"url\":\"https:\/\/www.oneytrust.com\/pt\/author\/julie-breton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Growing Threat of \"Infostealer\" Programs - Oneytrust","description":"Infostealers are an emerging malware threat with huge risk potential. Oneytrust experts give best advice for users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oneytrust.com\/pt\/infostealers\/","og_locale":"pt_PT","og_type":"article","og_title":"The Growing Threat of \"Infostealer\" Programs - Oneytrust","og_description":"Infostealers are an emerging malware threat with huge risk potential. Oneytrust experts give best advice for users.","og_url":"https:\/\/www.oneytrust.com\/pt\/infostealers\/","og_site_name":"Oneytrust","article_published_time":"2024-09-30T08:29:55+00:00","article_modified_time":"2025-07-11T13:13:14+00:00","og_image":[{"width":373,"height":342,"url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg","type":"image\/jpeg"}],"author":"Julie Breton","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Julie Breton","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oneytrust.com\/infostealers\/#article","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/infostealers\/"},"author":{"name":"Julie Breton","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d"},"headline":"The Growing Threat of &#8220;Infostealer&#8221; Programs","datePublished":"2024-09-30T08:29:55+00:00","dateModified":"2025-07-11T13:13:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oneytrust.com\/infostealers\/"},"wordCount":439,"publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"image":{"@id":"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg","articleSection":["Expertise","General"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/www.oneytrust.com\/infostealers\/","url":"https:\/\/www.oneytrust.com\/infostealers\/","name":"The Growing Threat of \"Infostealer\" Programs - Oneytrust","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage"},"image":{"@id":"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg","datePublished":"2024-09-30T08:29:55+00:00","dateModified":"2025-07-11T13:13:14+00:00","description":"Infostealers are an emerging malware threat with huge risk potential. Oneytrust experts give best advice for users.","breadcrumb":{"@id":"https:\/\/www.oneytrust.com\/infostealers\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oneytrust.com\/infostealers\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.oneytrust.com\/infostealers\/#primaryimage","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg","width":373,"height":342,"caption":"infosteler malware threat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oneytrust.com\/infostealers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oneytrust.com\/"},{"@type":"ListItem","position":2,"name":"The Growing Threat of &#8220;Infostealer&#8221; Programs"}]},{"@type":"WebSite","@id":"https:\/\/www.oneytrust.com\/#website","url":"https:\/\/www.oneytrust.com\/","name":"Oneytrust","description":"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.","publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oneytrust.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.oneytrust.com\/#organization","name":"Oneytrust","url":"https:\/\/www.oneytrust.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","width":171,"height":40,"caption":"Oneytrust"},"image":{"@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d","name":"Julie Breton","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","caption":"Julie Breton"},"url":"https:\/\/www.oneytrust.com\/pt\/author\/julie-breton\/"}]}},"taxonomy_info":{"category":[{"value":6,"label":"Expertise"},{"value":1,"label":"General"}]},"featured_image_src_large":["https:\/\/www.oneytrust.com\/wp-content\/uploads\/2024\/09\/infostealer.jpg",373,342,false],"author_info":{"display_name":"Julie Breton","author_link":"https:\/\/www.oneytrust.com\/pt\/author\/julie-breton\/"},"comment_info":0,"category_info":[{"term_id":6,"name":"Expertise","slug":"expertise","term_group":0,"term_taxonomy_id":6,"taxonomy":"category","description":"","parent":0,"count":28,"filter":"raw","cat_ID":6,"category_count":28,"category_description":"","cat_name":"Expertise","category_nicename":"expertise","category_parent":0},{"term_id":1,"name":"General","slug":"general","term_group":0,"term_taxonomy_id":1,"taxonomy":"category","description":"","parent":0,"count":29,"filter":"raw","cat_ID":1,"category_count":29,"category_description":"","cat_name":"General","category_nicename":"general","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/posts\/1289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/comments?post=1289"}],"version-history":[{"count":1,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/posts\/1289\/revisions"}],"predecessor-version":[{"id":1291,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/posts\/1289\/revisions\/1291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/media\/1290"}],"wp:attachment":[{"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/media?parent=1289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/categories?post=1289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oneytrust.com\/pt\/wp-json\/wp\/v2\/tags?post=1289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}