Monday, March 27, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
World Cybercon Middle East
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Okta User Error Could Lead to Password Compromise, And More!

    Okta User Error Could Lead to Password Compromise, And More!

    Cinoshi Malware-as-a-Service

    MaaS on Sale: Cybercrime Forum Selling Cinoshi Malware-as-a-Service for 2000 Rubles

    E-learning Platform Moodle

    Vulnerabilities Found in E-learning Platform Moodle, Users Urged to Update

    Explicit Online Content of Children

    Removing Explicit Online Content of Children is a Global War

    Rio Tinto Cyber Attack

    Rio Tinto Cyber Attack Puts Employee Information at Risk

    Team Insane PK Targets Indian Businesses

    Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

    Goa Cyber attack 2

    Cl0p Ransomware Lists Goa State Government as Victim

    opt out of ChatGPT data collection

    OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

    Okta User Error Could Lead to Password Compromise, And More!

    Okta User Error Could Lead to Password Compromise, And More!

    Cinoshi Malware-as-a-Service

    MaaS on Sale: Cybercrime Forum Selling Cinoshi Malware-as-a-Service for 2000 Rubles

    E-learning Platform Moodle

    Vulnerabilities Found in E-learning Platform Moodle, Users Urged to Update

    Explicit Online Content of Children

    Removing Explicit Online Content of Children is a Global War

    Rio Tinto Cyber Attack

    Rio Tinto Cyber Attack Puts Employee Information at Risk

    Team Insane PK Targets Indian Businesses

    Team Insane PK Targets Indian Businesses, Leaks Sensitive Data

    Goa Cyber attack 2

    Cl0p Ransomware Lists Goa State Government as Victim

    opt out of ChatGPT data collection

    OpenAI Has Privacy Issues: How Do We Opt Out of ChatGPT Data Collection?

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily Dark Web News

11 Million Computers Fall Victim as Info-Stealer Bypasses Major Antiviruses

Cybersecurity expert Alon Gal revealed that this type of attack is so sophisticated that even the most popular antivirus programs were not able to stop it.

Ashish Khaitan by Ashish Khaitan
February 14, 2023 - Updated on March 24, 2023
in Dark Web News, Firewall Daily, Hacker News
1
11 Million Computers Fall Victim as Info-Stealer Bypasses Major Antiviruses
683
SHARES
3.8k
VIEWS
Share on LinkedInShare on Twitter

Over 11 million computers have fallen victim to a devastating Info-stealer scheme.

According to cybersecurity expert Alon Gal, this type of attack is so sophisticated that even the most popular antivirus programs were not able to stop it. In fact, among the many antivirus options out there, Windows Defender is among the most widely installed – meaning that millions of users are potentially at risk.  

You might also like

North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

Okta User Error Could Lead to Password Compromise, And More!

Info-Stealer
(Source: Hudson Rock)

Moreover, twenty of the most popular antivirus programs out there – including some of the biggest names in the business – were no match for the info-stealers behind the campaign. With no antivirus program being able to offer a guaranteed protection, things might have turned for the worst. 

Shattered shields: Exploring the root causes of failing antivirus protection 

Info-Stealer
(Source: Hudson Rock)

The attack has targeted millions of computers worldwide – and it turns out that some of the most widely-used antivirus programs are unable to stop it. Among the many programs that failed to fend off the assault were some of the biggest names in the business, including Avast Antivirus, McAfee Firewall, and Reason Cyber security news

Other commonly installed programs like McAfee VirusScan, 360 Total Security, and Norton Security Ultra also fell prey to the info-stealers.  

Kaspersky software was heavily represented on the list, with Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Antivirus, and Kaspersky Security Cloud all appearing. Other notable antivirus software included Malwarebytes, Panda Dome, Microsoft Security Essentials, and Avira Antivirus. 

Here is a list of some of the anti-viruses info-stealers are capable of bypassing

  1. Windows Defender 
  2. Avast Antivirus 
  3. McAfee Firewall 
  4. Reason Cybersecurity 
  5. McAfee VirusScan 
  6. 360 Total Security 
  7. AVG Antivirus 
  8. ESET Security 
  9. Norton Security Ultra 
  10. Norton Security
  11. Kaspersky Internet Security 
  12. Malwarebytes 
  13. VirusScan de McAfee 
  14. Panda Dome 
  15. Kaspersky Total Security 
  16. Microsoft Security Essentials 
  17. Avira Antivirus 
  18. Kaspersky Antivirus 
  19. Kaspersky Security Cloud 
  20. Total AV 

Unmasking the complex relationship between antivirus and info-stealers 

Alon Gal, Co-Founder & CTO at Hudson Rock, explained why Info-stealers are creating havoc in the cyber world. Info-stealers are becoming an increasingly concerning trend in the world of cybercrime. These malicious programs are designed to steal sensitive information from victims, such as login credentials and financial data, and can have serious consequences for individuals and organizations,” Alon told The Cyber Express.

Info-Stealer
(Source: Hudson Rock)

 

As per Hudson Rock’s database, the info-stealer scheme has compromised 11,221,949 machines and 1,342,293 employee accounts across 195 countries, utilizing info-stealers as their preferred digital weapon.  

The report highlights a concerning trend of compromised Android devices, currently at 3,350,036, along with 4,158,695 compromised domains.

Info-Stealer
(Source: Hudson Rock)

These findings align with the antivirus programs used globally, with 71.58% of users opting for Windows Defender and 18.48% without any security program.  

Avast Antivirus, Reason cybersecurity, and McAfee Firewall were used by 4.19%, 2.9%, and 2.85% of users, respectively. Furthermore, India emerged as the most vulnerable country, with 560,044 compromised computers. 

Here is a list of the countries that have the most info-stealers infections:

  1. India 560,044
  2. Brazil 526,762
  3. Indonesia 354,345
  4. United States 264,456
  5. Egypt 245,980
  6. Vietnam 214,745
  7. Turkey 180,829
  8. Philippines 159,485
  9. Mexico 152,767
  10. Pakistan 151,150
  11. Thailand 150,834
  12. United Kingdom 133,788
  13. Algeria 124,527
  14. France 117,213
  15. Germany 116,013

Who is behind info-stealer campaigns?

info-stealer campaigns
(Source: Hudson Rock)

Many groups and individuals are responsible for running worldwide campaigns that aim to spread info-stealing malware. These campaigns opportunistically target anyone willing to download their malicious files. These malicious files are often promoted through Google ads, YouTube, and websites infected with malware. 

Information-stealing malware, also known as info-stealers, is designed to secretly collect sensitive data from victims’ devices and transmit it to an attacker-controlled server. This malware can infiltrate systems via email attachments, social engineering, or compromised websites and operate in the background undetected.  

The potential harm from info-stealers is vast, as they can compromise personal and financial data, passwords, and business information, leading to identity theft, financial fraud, and corporate espionage. The stolen information is often put on sale on the dark web, fueling an illicit market for sensitive data. 

In addition to their speed and wide reach, info-stealers can propagate through networks via self-replication or communication channels, presenting significant containment challenges. 

 Once a device is infected, the damage can spread to other devices, magnifying the impact. Furthermore, info-stealers are designed to be elusive and escape traditional antivirus software, with frequent updates that surpass the latest security measures, making detection and removal a complex task, and the damage caused can be irreversible.

How to protect yourself against info stealers? 

The most useful measures to avoid infecting your computer with an info-stealer is by downloading files from reputable websites, not opening email attachments, or clicking links from unknown or suspicious sources.  

Unfortunately, info stealers can bypass all traditional antiviruses, as seen in our report; it is up to individuals to be aware of infection risks to ensure the safety and security of their personal and corporate data,” Alon said. 

Individuals and organizations must implement several preventative measures to mitigate info-stealers’ risks. This includes ensuring that software is regularly updated, using strong and unique passwords, being cautious when handling suspicious emails and websites, and utilizing antivirus and anti-malware software. 

 It is also essential to have routine backups of critical data to avoid data loss and ransomware payments in case of a breach. 

In summary, info-stealers pose a severe threat to the security of personal and organizational information, given their ability to spread rapidly, compromise sensitive data, and evade detection. By adopting these measures and remaining vigilant, we can enhance our protection against this type of malware. 

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Antivirus failsInfo-Stealer Bypasses Major Antivirus Programs
Previous Post

LockBit 3.0 Claims Responsibility for Ransomware Attack on Hidalgo County

Next Post

Cloudflare Claims to Block Large-scale DDoS Attack, 71 Million Requests Per Second

Ashish Khaitan

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Related Posts

cybersecurity-education-legislation
Firewall Daily

North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

by Vishwa Pandagle
March 27, 2023
Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack
Firewall Daily

Konica Minolta Cyber Attack Puts Large Scale Information at Risk, STORMOUS Ransomware Group Claims the Attack

by Ashish Khaitan
March 27, 2023
Okta User Error Could Lead to Password Compromise, And More!
Firewall Daily

Okta User Error Could Lead to Password Compromise, And More!

by Chandu Gopalakrishnan
March 27, 2023
Cinoshi Malware-as-a-Service
Firewall Daily

MaaS on Sale: Cybercrime Forum Selling Cinoshi Malware-as-a-Service for 2000 Rubles

by Vishwa Pandagle
March 26, 2023
E-learning Platform Moodle
Firewall Daily

Vulnerabilities Found in E-learning Platform Moodle, Users Urged to Update

by Ashish Khaitan
March 26, 2023
Next Post
Largest DDoS Attack

Cloudflare Claims to Block Large-scale DDoS Attack, 71 Million Requests Per Second

Comments 1

  1. Rizwan Siddiqui says:
    1 month ago

    Hi,

    Thanks for the details. Hope you could check the infostealer with Spyshelter, Zemana antilogger and Bitdefender.
    Br

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.