Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Security Teams Must Deploy Anti-Infostealer Defenses Now
News

Security Teams Must Deploy Anti-Infostealer Defenses Now

Team-CWDBy Team-CWDOctober 17, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Infostealers are driving today’s ransomware wave and stealer logs can be bought for as little as $10 on the dark web.

At ISACA Europe 2025, Tony Gee, a principal cybersecurity consultant at 3B Data Security, urged security teams to deploy tactical defenses to protect against infostealers.  

Evolution of Infostealers

Since the early 2000s infostealers have become a common weapon in the arsenal of cybercriminals to gain initial access to targeted systems, with the emergence of keyloggers such as Zeus and SpyEye.

Around the early 2010s, new infostealer families like Vidar, Trickbot and Emotet, began integrating the capability to extract cryptocurrency.

Now, a wide variety of new infostealers frequently appear with different features and capabilities, expanding a market that has largely been dominated by LummaC2 and Redline.

Today, stealer logs (the output that infostealers produce) can be found for sale for as little as $10 on some Russian-language dark web marketplaces, according to Gee’s research.

The security consultant argued that the best way to defend against infostealer infection is through specific technical security controls.

“There are basic controls that you can implement, of course, such as adopting a zero trust architecture, ensuring a good password policy and robust network segmentation that includes separating privileges and provide security awareness training,” he said.

However, these alone are not sufficient to prevent infostealers. Gee provided six additional technical controls organizations should implement.

Top Six Technical Measures to Mitigate the Infostealer Threat

Regular Password Changes

Although frequent password changes can be burdensome, they are an efficient measure to mitigate the impact of credential theft and infostealer infections.

“The passwords that gets exposed in the stealer logs will then be changed by the time that someone comes to use it,” Gee explained.

FIDO2-Enabled Multifactor Authentication

Multifactor authentication (MFA) with a FIDO2-enabled technology is also “strongly recommended” against infostealers, especially for users with administrator privileges.

Gee argued that such a security measure will make it harder for a threat actor to sign in to systems and services, even with comprehensive logs on the user which have been stolen through infostealer malware.

Forced Authentication

The “force authentication” process refers to a policy where security teams require staff members to re-authenticate every time they try to gain access to somewhere sensitive within company systems or on the internet.

“It means that, instead of just using cookies to just rinse your entire domain, you have to step through multiple authentication steps,” Gee explained.

Session Token Expiration

Security teams ought to shorten the lifespan of authentication tokens, Gee also recommended.

“This method should be especially implemented for bring-your-own-device (BYOD) situations. One of the companies I work with has all cookies expire every day. It makes it really annoying to log in every day, but it’s very secure.”

Cookie Replay Detection

Another of Gee’s recommendations is for security teams to implement cookie replay detection processes on the browsers used by their workforce.

This security mechanism identifies and blocks fraudulent attempts to reuse stolen or intercepted session cookies (e.g. in replay attacks) by tracking cookie usage patterns, timestamps or unique identifiers.

It helps prevent unauthorized access by ensuring cookies are used only once or within valid contexts.

Suspicious and Impossible Travel Monitoring

Finally, Gee recommend security teams to deploy an automated security system that monitors connection locations and provide alerts for “suspicious or impossible travel.”

“This is when people are logging in twice from two different geographically located places in a short period of time, for instance. That’s an indicator of suspicious activity,” he concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Next Article Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.