I’ve been thinking about infostealers. Why? Well I’ve been doing a few ethical hacking challenges recently and when you find an exploit like an LFI, directory traversal, XSS, or some other method of obtaining data from a target you tend to build a playbook of places to look for data. I have a list of configuration file locations based on the target OS, and what appears to be installed (thanks to nmap and whatever the LFI can return).
Infostealers work in a similar way. They are essentially software programs designed to look for patterns: file name extensions such as PDF DOC DOCX etc, files containing bank details (X-digit strings), email addresses, contact books, login credentials, browser history. You get the idea. Depending on the infostealers purpose it will be programmed to look for patterns on each target. Once installed they begin scanning, looking for possible matches. They collate this data then covertly send it back to whomever set the infostealer in motion.
Treat infostealers like any other malicious software: employ a good antimalware strategy. Use a firewall, install good antivirus and antimalware software and keep your sensitive data protected with encryption and 2FA. Keep regular backups and monitor your accounts.
Protect your data.