Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Infostealers Crash Course: A Tradecraft Tuesday Recap
Published:
June 3, 2025

Infostealers Crash Course: A Tradecraft Tuesday Recap

By:
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

If a threat actor launches a ransomware, extortion, or identity theft attack, the odds are that infostealers—and the credentials they’ve compromised—are behind it. Infostealers have quickly evolved into a major threat, fueling high-profile data breaches. It’s no wonder Huntress’ 2025 Cyber Threat Report found that infostealers represented almost a quarter of all incidents our team saw last year. 

Threat actors deploy infostealers to harvest credentials, financial information, and sensitive data, which is then sold on underground marketplaces to buyers that may want to target individuals or corporations with ransomware, extortion attacks, and more.

In the May Huntress Tradecraft Tuesday, Greg Linares, Principal Threat Intelligence Analyst at Huntress, and Lindsey O’Donnell-Welch, technical community engagement writer at Huntress, discussed how infostealers have transformed into the modern threat that they are today, how infostealer attacks present themselves in the SOC environment, and how businesses can protect themselves.  


It all started with Zeus: A quick history of infostealers

Infostealers can be traced back to Zeus, malware which was first introduced in 2007. In its original variant, it could access victims’ banking credentials and financial information. In 2011, the source code of Zeus leaked, leading to the rapid expansion of infostealers like AZORult and HawkEye across the threat landscape (as we’ll see later in this blog, source code leaks and subsequent infostealer variants that pop up Hyra-style represent a repeating trend).


Figure 1: Infostealer families (in red) and marketplaces (in blue)

Not only were more infostealers starting to crop up, but they were also targeting more than just financial data, including crypto wallets and software license data. Soon, the true industrialization of infostealers began to take form, with power players like Raccoon, Vidar, and RedLine being built out. At the same time, marketplaces like Genesis and Russian Market started booming.

Today’s infostealer landscape has continued this shift, with even more variants forking off of existing families, and cybercriminals targeting information like multi-factor authentication (MFA) codes, as well as Discord and Slack credentials and logs. Meanwhile, marketplaces have further matured and integrated APT groups as well, enabling an environment where threat actors can identify specific information, down to the details about specific corporations or individuals, to launch targeted attacks. 


All your data are belong to us 

While infostealers are known for swiping victims’ email and browser credentials and credit card data, modern infostealers target a broad set of information aimed at identity and financial theft, and they can enable further data harvesting.

The “primo data” from infostealers currently is corporate information, specifically SAML, SSO, VPN, SSH, RMM, RDP, Slack, and FTP credentials. Slack tokens, for instance, are considered extremely valuable on underground marketplaces, and many breaches (including attacks launched by Scattered Spider) have occurred exclusively using Slack tokens. API keys and cloud service credentials are also ramping up in popularity amongst threat groups as well.

Here are some other types of data that infostealers target: 

  • Cookies, single sign-on (SSO) tokens, session tokens, JWT tokens

  • 2FA, MFA, and OTP keys

  • Crypto wallets, recovery, and seed phrases

  • API keys and cloud service credentials

  • Personally identifiable information (PII), protected health information (PHI), geolocation data, chat data, and photos (specifically for extortion)

After infostealers gather all this data, it’s then turned over in underground marketplaces to be used in further attacks. The cost of this stolen data varies, ranging from email account credentials with an average price per access of $10 to $65, up to SSO tokens (costing on average $100 to $250) or cloud service credentials (costing on average $30 to $200). 

There are several notable infostealer marketplaces, including Russian Market, 2Easy Market, and InfoLog Empire. Several more marketplaces have ceased to exist over the years (including Genesis Market, StealerNet, and RaidForums), either because they shut down or because they were seized by law enforcement. These marketplaces have unique characteristics: for instance, Genesis Market (which started in 2018 and was seized in 2023) was invitation-only, and it included an interface that allowed cybercriminals to browse stolen data by location, IP, browser fingerprint, or otherwise. 


The Banshee Stealer source code leak and macOS stealers

The macOS infostealer landscape has gone through an interesting evolution over the last year, due in part to the source code leak of Banshee Stealer. In November 2024, Banshee Stealer’s source code was leaked, and it abruptly shut down. While the leak enabled better detection measures for defenders, many infostealer developers also took advantage, using the source code in order to branch out with their own variants, including:

  • FrigidStealer: Targets Safari and Chrome credentials, Apple Notes documents, and crypto wallet data
  • FleshStealer: Targets Chromium-based web browsers for credentials and cookies, as well as 2FA passwords or Wi-Fi network credentials 

  • Realst Stealer: Targets macOS Keychain data, crypto wallet data, and Chromium-based browser information 

Figure 2: Infostealer developers used Banshee source code

Overall, macOS infostealers operate in a slightly different way from Windows infostealers due to the differences between the operating systems (as we previously touched on in our April Tradecraft Tuesday episode, “Say Hello to Mac Malware”). macOS infostealers primarily target Apple’s iCloud and Keychain, which are where most of the credentials are stored.

Figure 3: macOS stealers and their operational differences

In some cases, macOS stealers attempt to bypass Apple-specific protections like the Transparency Consent and Control (TCC) framework, Apple’s database used to prompt users when an app tries to perform actions requiring their specific permission. Infostealers like Realst also abuse the AppleScript framework (Apple’s scripting language) to simulate Apple prompts, with the end goal of stealing end-user credentials.


Law enforcement takedowns: Marketplaces and infrastructure

Law enforcement authorities have cracked down on various parts of the infostealer lifecycle over the past year, with takedowns of infostealer infrastructure, arrests of high-profile infostealer developers and administrators, and the targeting of marketplaces where infostealer credentials are sold.

In October 2024, international authorities announced the takedown of the RedLine and META infostealer after seizing domains, servers, and Telegram accounts used by the infostealers’ administrators. The US Department of Justice (DoJ) also unsealed charges against Maxim Rudometov, one of the developers and administrators of RedLine infostealer. 

Figure 4: The operational backend of the RedLine stealer (SOURCE: Department of Justice)

Then, in January, the DoJ announced an international operation, called Operation Talent, to take down cybercrime marketplaces Cracked and Nulled. The takedown is notable as it relates to infostealers because they are major marketplaces used to sell stolen login credentials (in addition to hacking tools and servers) from infostealer campaigns. Takedowns of marketplaces in general can have a significant influence on the infostealer landscape overall, with the takedowns of Genesis Market and RaidForums having major impacts.

More recently, in May, Europol announced a law enforcement operation targeting Lumma Stealer, which disrupted its technical infrastructure with federal authorities seizing its infrastructure and control panel. The operation was part of a public-private sector partnership effort, and Microsoft announced it had seized 2,300 domains linked to Lumma’s infrastructure.   


Infostealers in the wild (and how to prevent them)

Huntress has detected various attacks involving infostealers in the wild. In one incident in March 2025, a user downloaded an executable notiom.exe from a newly registered domain that is linked to a malicious IP address. Here, the threat actor appeared to be disguising the executable as the legitimate Notion app, which is a productivity and note-taking application. As Figure 5 below outlines, the autorun name is electron.app.Notion—Electron is a framework used for developing apps, which has previously been abused by threat actors for infostealers.

After the executable was downloaded, it misused remote debugging in Chrome, which is a common malicious activity that is observed by infostealers in order to extract cookies. A file named raretemp was also created in the temp directory (this is a name that has been used by Lumma Stealer). Lumma Stealer is the second most common infostealer (behind ChromeLoader) that Huntress has observed over the last year.

Figure 5: Lumma Stealer incident detected by Huntress SOC

This is just one example of an attack involving an infostealer. Infostealers are distributed in various ways, including malicious websites, phishing emails, and malvertising. 

A common infostealer attack vector that threat actors use is Google-based malvertising, where they buy a domain and hide infostealers in Google Ads that target people looking for certain things, like popular tools. Because of the popularity of this attack vector, businesses should train their employees not to trust Google Ads and rely on ad blockers. Companies can prevent or mitigate the risks caused by infostealers with a multi-layered defense strategy. Measures like MFA can reduce the effectiveness of stolen credentials. 

Endpoint detection and response (EDR) controls can also detect unauthorized access on session tokens or encrypted files. There are other common indicators of compromise that can tip off infostealer attacks, including the creation of Run Keys, noisy file activity, and higher DiskIO activity. Infostealers will also start downloading components into non-standard folders. 


The future of infostealer threats

As we’ve outlined here, infostealers have a long and varied history, and the current infostealer landscape includes mature marketplaces and a wide variety of targeted data. Infostealers operate in a vicious cycle, stealing credentials in initial campaigns, which are then sold to other cybercriminals and used to launch further attacks. 

The increase of remote and hybrid work environments—and the blending of personal and professional devices and accounts—has exacerbated the threat of infostealers. These trends have widened the attack surface and allowed threat actors to grab work credentials that may be stored on unmanaged, personal devices.

With the pervasiveness of infostealers, it’s important for companies to better understand security measures they can take to mitigate this threat. Tune into our Tradecraft Tuesday for more information on infostealers and the risks that they pose to businesses. 



Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Journey to the Center of the Dark Web: A Tradecraft Tuesday Recap

    Huntress researchers take a tour through the dark web, from innovative threat actor marketing techniques to cybercrime drama on BreachForums.
  • The Ultimate Validation: Making a Hacker’s “Do Not Engage” List

    When Celestial Stealer runs in the wild, it looks for Huntress’ own Jai Minton as a potential threat, and this shuts down the infostealer operation if his name is detected.
  • Say Hello to Mac Malware: A Tradecraft Tuesday Recap

    In this month’s Tradecraft Tuesday, we talked about how threat actors are finetuning their macOS malware in order to maintain persistent access and avoid detection by Apple’s security features.
  • “Malware, from the Outside!”: How a Threat Actor Used Fake OpenClaw Installers to Infect Systems with GhostSocks and Information Stealers

    Huntress warns of fake OpenClaw installers on GitHub deploying malware. Learn how these attacks happen, identify signs of infection, and stay protected.
  • #ShadyHacks with Kyle Hanslovan

    Huntress CEO Kyle Hanslovan's live hack demo: modern hacker playbook, with stolen credentials, MFA bypass, and M365 token hijacking. Get defense tips, stay protected.
  • Mommy, Does Santa Like NordVPN?

    Huntress Managed ITDR uncovers risks behind popular VPNs and proxies like NordVPN, Mullvad, and more—helping you steer clear of hackers this holiday season.
  • Live Hacking Into Microsoft 365 with Kyle Hanslovan

    Learn how cybercriminals bypass Microsoft 365 MFA and steal credentials in a live hacking demo. Discover defense strategies to protect your systems.
  • Creating macOS Ransomware

    With the beta release of the Huntress macOS agent, we wanted to share some of the Apple-y stuff we’ve been up to behind the scenes.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy