• Home
  • Cryptocurrency
  • Blockchain
  • Analysis
  • News
    • Regulations Security
    • Getting Started
  • Insights
    • Opinion
    • Expert Interview
  • All Posts
Facebook X (Twitter) Instagram
Trending
  • KiloEx Exchange Exploiter Restores All Stolen Funds Following $7.5 Million Hack
  • Hashkey Targets XRP ETF in Asia with New Fund Supported by Ripple
  • Sygnum Predicts Potential Altcoin Rally in Q2 2025 Due to Enhanced Regulations
  • Media Tycoon Files Counterclaim Against Justin Sun in $78 Million Sculpture Dispute
  • Yemenis are embracing DeFi in response to US sanctions on the Houthi group
  • Saylor and ETF Investors’ ‘Stronger Hands’ Contribute to Bitcoin Stabilization — Analyst
  • Bitcoin Dip Buyers Show Interest at BTC Range Lows, Yet Remain Risk-Averse Until $90K Establishes Support
  • Kyrgyzstan’s President Enacts CBDC Legislation Granting Legal Status to ‘Digital Som’
Facebook X (Twitter) Instagram
CoinovelCoinovel
  • Home
  • Cryptocurrency
  • Blockchain
  • Analysis
  • News
    • Regulations Security
    • Getting Started
  • Insights
    • Opinion
    • Expert Interview
  • All Posts
CoinovelCoinovel
Home » Analyzing Recent Credential Leaks and the Emergence of InfoStealer Malware
Analyzing Recent Credential Leaks and the Emergence of InfoStealer Malware
Analyzing Recent Credential Leaks and the Emergence of InfoStealer Malware

Analyzing Recent Credential Leaks and the Emergence of InfoStealer Malware

0
By admin on 2025-03-28 Cryptocurrency

The threat of InfoStealer malware is on the rise, targeting people and organizations across digital finance and far beyond.

InfoStealers are a category of malware designed to extract sensitive data from infected devices without the victim’s knowledge. This includes passwords, session cookies, crypto wallet details and other valuable personal information.

According to Kaspersky, these malware campaigns leaked over 2 million bank card details last year. And that number is only growing.

Malware-as-a-service

These tools are widely available via the malware-as-a-service model. Cybercriminals can access advanced malware platforms that offer dashboards, technical support and automatic data exfiltration to command-and-control servers for a subscription fee. Once stolen, data is sold on dark web forums, Telegram channels or private marketplaces.

The damage from an InfoStealer infection can go far beyond a single compromised account. Leaked credentials can lead to identity theft, financial fraud and unauthorized access to other services, especially when credentials are reused across platforms.

Binance’s internal data echoes this trend.

In the past few months, we’ve identified a significant uptick in the number of users whose credentials or session data appear to have been compromised by InfoStealer infections. These infections don’t originate from Binance but affect personal devices where credentials are saved in browsers or auto-filled into websites.

Distribution vectors

InfoStealer malware is often distributed via phishing campaigns, malicious ads, trojan software or fake browser extensions. Once on a device, it scans for stored credentials and transmits them to the attacker.

The common distribution vectors include:

  • Phishing emails with malicious attachments or links.
  • Fake downloads or software from unofficial app stores.
  • Game mods and cracked applications are shared via Discord or Telegram.
  • Malicious browser extensions or add-ons.
  • Compromised websites that silently install malware (drive-by downloads).

Once active, InfoStealers can extract browser-stored passwords, autofill entries, clipboard data (including crypto wallet addresses) and even session tokens that allow attackers to impersonate users without knowing their login credentials.

What to watch out for

Some signs that might suggest an InfoStealer infection on your device:

  • Unusual notifications or extensions appearing in your browser.
  • Unauthorized login alerts or unusual account activity.
  • Unexpected changes to security settings or passwords.
  • Sudden slowdowns in system performance.

A breakdown of InfoStealer malware

Over the past 90 days, Binance has observed several prominent InfoStealer malware variants targeting Windows and macOS users. RedLine, LummaC2, Vidar and AsyncRAT have been particularly prevalent for Windows users.

RedLine Stealer is known for gathering login credentials and crypto-related information from browsers.

LummaC2 is a rapidly evolving threat with integrated techniques to bypass modern browser protections such as app-bound encryption. It can now steal cookies and crypto wallet details in real-time.

Vidar Stealer focuses on exfiltrating data from browsers and local applications, with a notable ability to capture crypto wallet credentials.

AsyncRAT enables attackers to monitor victims remotely by logging keystrokes, capturing screenshots and deploying additional payloads. Recently, cybercriminals have repurposed AsyncRAT for crypto-related attacks, harvesting credentials and system data from compromised Windows machines.

For macOS users, Atomic Stealer has emerged as a significant threat. This stealer can extract infected devices’ credentials, browser data and cryptocurrency wallet information. Distributed via stealer-as-a-service channels, Atomic Stealer exploits native AppleScript for data collection, posing a substantial risk to individual users and organizations using macOS. Other notable variants targeting macOS include Poseidon and Banshee.

At Binance, we respond to these threats

by monitoring dark web marketplaces and forums for leaked user data, alerting affected users, initiating password resets, revoking compromised sessions and offering clear guidance on device security and malware removal.

Our infrastructure remains secure, but credential theft from infected personal devices is an external risk we all face. This makes user education and cyber hygiene more critical than ever.

We urge users and the crypto community to be vigilant to prevent these threats by using antivirus and anti-malware tools and running regular scans. Some reputable free tools include Malwarebytes, Bitdefender, Kaspersky, McAfee, Norton, Avast and Windows Defender. For macOS users, consider using the Objective-See suite of anti-malware tools.

Lite scans typically don’t work well since most malware self-deletes the first-stage files from the initial infection. Always run a full disk scan to ensure thorough protection.

Here are some practical steps you can take to reduce your exposure to this and many other cybersecurity threats:

  • Enable two-factor authentication (2FA) using an authenticator app or hardware key.
  • Avoid saving passwords in your browser. Consider using a dedicated password manager.
  • Download software and apps only from official sources.
  • Keep your operating system, browser and all applications up to date.
  • Periodically review authorized devices in your Binance account and remove unfamiliar entries.
  • Use withdrawal address whitelisting to limit where funds can be sent.
  • Avoid using public or unsecured WiFi networks when accessing sensitive accounts.
  • Use unique credentials for each account and update them regularly.
  • Follow security updates and best practices from Binance and other trusted sources.
  • Immediately change passwords, lock accounts and report through official Binance support channels if malware infection is suspected.

The growing prominence of the InfoStealer threat

is a reminder of how advanced and widespread cyberattacks have become. While Binance continues to invest heavily in platform security and dark web monitoring, protecting your funds and personal data requires action on both sides.

Stay informed, adopt security habits and maintain clean devices to significantly reduce your exposure to threats like InfoStealer malware.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Hashkey Targets XRP ETF in Asia with New Fund Supported by Ripple

Sygnum Predicts Potential Altcoin Rally in Q2 2025 Due to Enhanced Regulations

Bitcoin Dip Buyers Show Interest at BTC Range Lows, Yet Remain Risk-Averse Until $90K Establishes Support

  • Popular
  • Latest
  • Hot comments
2022-02-23 Getting Started

Cryptopedia: Unveiling the Metaverse’s Potential to Revolutionize the Internet

2022-03-07 Getting Started

Unveiling Cryptopedia: Grasp the fundamentals of DAOs and their operational mechanisms

2022-03-25 Getting Started

Cryptopedia: Explore Web3 and its goal to revolutionize internet services

2025-04-18 Regulations Security

KiloEx Exchange Exploiter Restores All Stolen Funds Following $7.5 Million Hack

2025-04-18 Cryptocurrency

Hashkey Targets XRP ETF in Asia with New Fund Supported by Ripple

2025-04-18 Cryptocurrency

Sygnum Predicts Potential Altcoin Rally in Q2 2025 Due to Enhanced Regulations

Latest Gallery

Latest Recommendations
2025-04-18 Regulations Security

KiloEx Exchange Exploiter Restores All Stolen Funds Following $7.5 Million Hack

2025-04-18 Cryptocurrency

Hashkey Targets XRP ETF in Asia with New Fund Supported by Ripple

2025-04-18 Cryptocurrency

Sygnum Predicts Potential Altcoin Rally in Q2 2025 Due to Enhanced Regulations

2025-04-18 Regulations Security

Media Tycoon Files Counterclaim Against Justin Sun in $78 Million Sculpture Dispute

2025-04-18 Blockchain

Yemenis are embracing DeFi in response to US sanctions on the Houthi group

2025-04-18 Regulations Security

Saylor and ETF Investors’ ‘Stronger Hands’ Contribute to Bitcoin Stabilization — Analyst

2025-04-18 Cryptocurrency

Bitcoin Dip Buyers Show Interest at BTC Range Lows, Yet Remain Risk-Averse Until $90K Establishes Support

2025-04-18 News

Kyrgyzstan’s President Enacts CBDC Legislation Granting Legal Status to ‘Digital Som’

2025-04-17 Blockchain

Polygon’s Nailwal: The Jio Partnership Will Propel Real-World Web3 Adoption for 450 Million Users

2025-04-17 Blockchain

Babylon’s Total Value Locked Decreases by 32% as Wallets Unstake $1.2B in Bitcoin

2025-04-17 Regulations Security

OpenAI pursued a deal with Anysphere prior to shifting its focus to WindSurf

2025-04-17 Analysis

Bitcoin Gold’s Imitation Strategy Could Surpass $150K as BTC Remains ‘Remarkable’

2025-04-17 Cryptocurrency

AI Tokens and Memecoins Dominate Cryptocurrency Narratives in Q1 2025: CoinGecko

2025-04-17 Cryptocurrency

Four Reasons Why the Price of Bitcoin Could Surge to $90,000 in April

2025-04-17 News

Trump Criticizes Powell for Delaying Interest Rate Cuts, Calling It ‘Too Late’

2025-04-17 News

Wyoming Commission Considers Whether Stablecoin Falls Under SEC Regulations

About
About

Coinovel is an enthralling novel of cryptocurrencies. Engage with narratives, delve into stories, and journey through the captivating world of digital currencies.

X (Twitter) Telegram
Popular posts
2022-02-23 Getting Started

Cryptopedia: Unveiling the Metaverse’s Potential to Revolutionize the Internet

2022-03-07 Getting Started

Unveiling Cryptopedia: Grasp the fundamentals of DAOs and their operational mechanisms

2022-03-25 Getting Started

Cryptopedia: Explore Web3 and its goal to revolutionize internet services

Copyright © 2025 coinovel. All rights reserved.
  • Home
  • Cryptocurrency
  • Blockchain
  • Regulations Security
  • Analysis
  • Insights
  • News
  • Getting Started

Type above and press Enter to search. Press Esc to cancel.