all-in-one privacy solution":["Proton Unlimited jest kompleksowym rozwiązaniem zapewniającym prywatność"],"Black Friday":["Czarny Piątek"],"No ads. Privacy by default.":["Brak reklam. Prywatność w standardzie."],"People before profits":["Ludzie przed zyskiem"],"Security through transparency":["Bezpieczeństwo dzięki przejrzystości"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Najlepsze oferty Proton Mail ${ BLACK_FRIDAY }"],"The world’s only community- supported email service":["Jedyna na świecie usługa e-mail wspierana przez społeczność"]},"specialoffer:limited":{"${ hours } hour":["${ hours } godzina","${ hours } godziny","${ hours } godzin","${ hours } godziny"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Pozostało: ${ hoursLeft }, ${ minutesLeft } i ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuta","${ minutes } minuty","${ minutes } minut","${ minutes } minuty"],"${ seconds } second":["${ seconds } sekunda","${ seconds } sekundy","${ seconds } sekund","${ seconds } sekundy"],"Limited time offer":["Oferta ograniczona czasowo"]},"specialoffer:listitem":{"Create multiple addresses":["Utwórz wiele adresów"],"Hide-my-email aliases":["Aliasy hide-my-email"],"Quickly unsubscribe from newsletters":["Szybko anuluj subskrypcję biuletynów"],"Use your own domain name":["Korzystaj z własnej nazwy domeny"]},"specialoffer:logos":{"As featured in":["Opinie naszych klientów"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Uzyskaj zaszyfrowaną usługę e-mail, która chroni Twoją prywatność"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Wyprzedaż Proton Mail z okazji Czarnego Piątku – uzyskaj do 40% zniżki"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Uzyskaj do 40% zniżki na subskrypcje Proton Mail w ten Czarny Piątek. Znajdź wspaniałe oferty naszych bezpiecznych planów usługi poczty elektronicznej w szyfrowaniu end-to-end."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Wyprzedaż Proton Mail z okazji Czarnego Piątku | Do 40% zniżki na bezpieczną pocztę elektroniczną"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Płatne ${ TOTAL_SUM } za pierwszy rok"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["* Płatne ${ TOTAL_SUM } za pierwsze 2 lata"],"30-day money-back guarantee":["30-dniowa gwarancja zwrotu pieniędzy"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Płatne ${ TOTAL_SUM } za pierwsze 2 lata"],"Billed at ${ TOTAL_SUM } for the first year":["Płatne ${ TOTAL_SUM } za pierwszy rok"],"You save ${ SAVE_SUM }":["Oszczędzasz ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Uwielbiam ProtonMail"],"My favorite email service":["Moja ulubiona usługa e-mail"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Dziękuję Protonowi za dbanie o nasze bezpieczeństwo w skomplikowanym internetowym uniwersum."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Dostajesz to, za co płacisz. W przypadku przedsiębiorstw big tech, jeśli nie płacisz nic, zostaniesz wykorzystany. Przestałam korzystać z Gmail i przeniosłam się na @ProtonMail"]},"specialoffer:time":{"Days":["Dni"],"Hours":["Godz."],"Min":["Min"]},"specialoffer:title":{"And much more":["I wiele więcej"],"Safe from trackers":["Żadnych elementów śledzących"],"Stay organized":["Dbaj o dobrą organizację"],"Black Friday email deals":["Oferty e-mailowe na Czarny Piątek"],"Don’t just take our word for it":["Nie musisz wierzyć nam na słowo"],"Make your inbox yours":["Niech skrzynka odbiorcza należy tylko do Ciebie"],"Our story":["Nasza historia"],"Transfer your data from Google in one click":["Przenieś dane z Google jednym kliknięciem"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Uzyskaj dostęp do zablokowanych treści i przeglądaj prywatnie Internet. Obejmuje ponad ${ TOTAL_VPN_SERVERS } serwerów w ponad ${ TOTAL_VPN_COUNTRIES } krajach z możliwością połączenia do 10 urządzeń, a także dostęp do globalnych usług streamingu, blokadę reklam, złośliwego oprogramowania i wiele więcej."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Łatwo udostępniaj swój kalendarz rodzinie, znajomym oraz współpracownikom i wyświetla kalendarze zewnętrzne."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Zawiera obsługę 1 niestandardowej domeny e-mail, 10 adresów e-mail, 10 aliasów hide-my-email, udostępnianie kalendarza i nie tylko."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Obejmuje obsługę 3 niestandardowych domen e-mail, 15 adresów e-mail, nielimitowane aliasy hide-my-email, udostępnianie kalendarza i nie tylko."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Zarządzanie nawet 25 kalendarzami, aplikacje mobilne, bezpieczne szyfrowanie metodą end-to-end, importowanie kalendarza za pomocą jednego kliknięcia z Google i więcej."]},"Status banner":{"Learn more":["Dowiedz się więcej"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Uwaga: obecnie występują problemy z usługą ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["Mamy problemy z co najmniej jedną usługą."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["W tej chwili mamy problemy z usługą Proton VPN"],"Learn more":["Dowiedz się więcej"]},"steps":{"Step":["Krok"]},"suggestions":{"Suggestions":["Sugestie"]},"Support":{"Sub category":["Podkategoria","Podkategorie","Podkategorii","Podkategorii"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min","${ readingTime } min","${ readingTime } min"],"Category":["Kategoria","Kategorie","Kategorii","Kategorii"],"Didn’t find what you were looking for?":["Nie znaleziono szukanej frazy?"],"General contact":["Skontaktuj się, wykorzystując ogólne zapytanie"],"Get help":["Uzyskaj pomoc"],"Legal contact":["Skontaktuj się z działem prawnym"],"Media contact":["Skontaktuj się z zespołem medialnym"],"Partnerships contact":["Skontaktuj się z zespołem ds. partnerstwa"],"Reading":["Odczytywanie"]},"Support Form Platform option":{"VPN for Android TV":["VPN dla Android TV"],"VPN for Apple TV":["VPN na Apple TV"],"VPN for Chromebook":["VPN dla Chromebooka"]},"Support troubleshooting":{"App version":["Wersja aplikacji"],"Browser":["Przeglądarka"],"Check if this helps":["Sprawdź, czy to pomoże"],"Choose a product":["Wybierz produkt"],"Did this solve your issue?":["Czy Twój problem został rozwiązany?"],"Faster assistance is just a few clicks away":["Szybsze wsparcie uzyskasz w kilka kliknięć"],"How can we help?":["Jak możemy pomóc?"],"No, contact support":["Nie, skontaktuj się z pomocą techniczną"],"Please fill out one field after another":["Wypełnij pola jedno po drugim"],"Please make your selections":["Dokonaj wyboru"],"Proton account":["Konto Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Dziękujemy za podzielenie się opinią"],"What can we help with?":["W czym możemy pomóc?"],"Yes":["Tak"]},"support_modal_search_query":{"Search query":["Zapytanie wyszukiwania"]},"support_search_button":{"Search":["Szukaj"]},"support_search_i_am_looking_for":{"I'm looking for":["Szukam"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["W celu szybszego rozwiązania problemu dokonaj zgłoszenia przez aplikację Bridge: Pomoc > Zgłoś problem."],"Information":["Informacje"]},"SupportForm:option":{"Account Security":["Bezpieczeństwo konta"],"Contacts":["Kontakty"],"Custom email domain":["Niestandardowa domena e-mail"],"Email delivery and Spam":["Dostarczanie wiadomości e-mail i spam"],"Encryption":["Szyfrowanie"],"Login and password":["Login i hasło"],"Merge aliases and accounts":["Scalanie aliasów i kont"],"Migrate to Proton":["Migracja do Proton"],"Notifications":["Powiadomienia"],"Other":["Inne"],"Plans and billing":["Plany i rozliczenia"],"Proton for Business":["Proton for Business"],"Sign up":["Rejestracja"],"Storage":["Przestrzeń dyskowa"],"Users, addresses, and identities":["Użytkownicy, adresy i tożsamości"]},"SupportForm:optionIntro":{"Select a topic":["Wybierz temat"]},"Testimonial":{"Awards":["Nagrody"],"Customers":["Klienci"],"Featured":["Wyróżnione"],"Go to testimonial source":["Przejdź do źródła referencji"],"Open source of award":["Otwórz źródło nagrody"],"Open source of quote":["Otwórz źródło cytatu"],"Reviews":["Opinie"],"Videos":["Pliki wideo"],"Watch on TikTok":["Oglądaj na TikTok"],"Watch on YouTube":["Oglądaj na YouTube"]},"TestimonialCategory":{"Awards":["Nagrody"],"Customers":["Klienci"],"Featured":["Wyróżnione"],"Media":["Multimedia"],"Reviews":["Opinie"],"Videos":["Pliki wideo"]},"Text":{"If you need help, check out our ${ supportLink }.":["Jeśli potrzebujesz pomocy, sprawdź naszą ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Strona, której szukasz, mogła zostać usunięta lub link jest przestarzały."],"Your question may already have an answer in our knowledge base:":["Na Twoje pytanie może już istnieć odpowiedź w bazie wiedzy:"]},"Title":{"On this page":["Na tej stronie"],"Related articles":["Powiązane artykuły"],"Share ${ thisPage }":["Udostępnij ${ thisPage }"],"Switch to Proton Pass - Contact us":["Przejdź na Proton Pass – skontaktuj się z nami"],"Thank you!":["Dziękujemy!"],"this page":["tę stronę"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Uzyskaj dostęp do zablokowanych treści i przeglądaj prywatnie Internet. Obejmuje ponad ${ TOTAL_VPN_SERVERS } serwerów w ponad ${ TOTAL_VPN_COUNTRIES } krajach, najwyższe prędkości VPN, ${ TOTAL_VPN_CONNECTIONS } połączeń VPN, usługi streamingu na całym świecie, blokowanie reklam oraz złośliwego oprogramowania i wiele więcej."]},"vpn_servers":{"Get Proton VPN Plus":["Wybierz plan Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Wybierz Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Portfel"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Portfel"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Przewodnik po systemie Bitcoin"],"Proton Wallet news":["Aktualności Proton Wallet"],"Proton Wallet support":["Wsparcie dla Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Zawiera wszystko, co Proton Unlimited oraz"],"Limited availability":["Ograniczona dostępność"],"The easiest way to securely own, send, and receive Bitcoin":["Najprostszy sposób na bezpieczne przechowywanie, wysyłanie i odbieranie waluty Bitcoin"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Odkryj rozwiązanie Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Bezpiecznie przechowuj i przesyłaj Bitcoiny dzięki szyfrowanemu portfelowi typu self-custody."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Dowiedz się więcej o internetowym systemie gotówkowym Bitcoin."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Miej pełny nadzór nad swoimi Bitcoinami."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["Szyfrowany portfel o otwartym kodzie źródłowym, który daje Ci pełną kontrolę."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
Infostealers: What they are, how they work, and how to protect yourself | Proton
In an ever-evolving cyber threat landscape, infostealers — malicious programs designed to gather sensitive information from infected systems and send that information back to an attacker — have emerged as a growing threat to individuals and organizations alike.
According to a report released this year by Constella Intelligence(nowe okno), more than 500 million devices in 2023 were found to be infected with nearly 2 billion infostealer records, including usernames, passwords, credit card numbers, Social Security numbers, and other sensitive information.
While the rise of infostealers is notable, they are not new. What has changed, however, is the business model and sophistication of the infostealer ecosystem. Previously, malicious groups needed specialized expertise to develop malware. Today, they can simply use malware-as-a-service (MaaS) for a $120 monthly payment. This shift has opened new revenue streams for existing malware developers and a potential doorway for criminals with no particular technical skills.
This blog post will delve into what infostealers are, how they operate, and where the data they collect goes. We will also explore the reliability of infostealer data and how you can protect yourself.
If you are already using Proton Mail and have Proton Sentinel enabled, you automatically have enhanced protection from infostealers, as Proton Sentinel detects logins from malicious actors, even if they have already stolen your credentials. Dark Web Monitoring in Proton Mail and Proton Pass also warns you if it detects that any of your credentials have been leaked onto the dark web.
What are infostealers?
Infostealers are a type of malware designed to steal from a compromised system information including but not limited to:
Login credentials (usernames/email addresses and passwords)
Financial information (credit card numbers, bank account details)
Personal data (Social Security numbers, addresses, phone numbers)
Browser data (bookmarks, history, cookies)
Emails and chat logs
Images and documents
Crypto wallets
Screenshots (some infostealers take periodic screenshots and send them back to the attacker)
How do infostealers work?
Infostealers are often used in conjunction with other types of malware to create a more comprehensive attack.
They can be delivered through various means, including phishing emails, malicious websites, and infected software downloads. We can break down their operations into three parts:
Infostealer delivery
Data collection
Data exfiltration
Infostealer delivery
The first step in an infostealer attack is the infection of the target system. This can occur through:
Phishing emails: Emails containing malicious attachments or links that, when opened, download and install the infostealer.
Malicious websites: Visiting compromised or malicious websites that exploit vulnerabilities in the user’s browser to install the infostealer.
Malvertising: Using online advertising to spread malware, often by injecting malicious or malware-laden advertisements into legitimate websites — or even by compromising the social media accounts of companies and using this to create malicious ads.
Infected software: Downloading and installing software from untrusted sources that contains the infostealer. Typically, an attacker will put up “free” versions of popular software hoping that people will download them, which they often do.
Data collection
Once installed, the infostealer begins to collect data from the infected system. This process can involve:
Keyloggers: Almost all infostealers have a key logger, which provides attackers with every keystroke a user makes. Attackers can later sift through this data to extract passwords, credit card numbers, and other sensitive personal information.
Form grabbers: This technique intercepts data submitted through web forms before it is encrypted. It is particularly effective for stealing login credentials, payment details, and other information entered on websites.
Clipboard hijackers: Infostealers can monitor and alter the clipboard content on an infected device. When a user copies sensitive data like account numbers or passwords, the malware can replace or steal this information.
Remote access: Amore sophisticated type of malware, also commonly referred to as RATs (remote access trojans), this type of malware gives attackers remote access to a user’s machine. Once inside your machine, an attacker has access to everything they need. Famous examples include Agent Tesla, LokiBot, and TrickBot.
Screen captures: By taking screenshots at crucial moments, such as when a user is entering credentials or viewing personal information, this method bypasses the limitations of text-based data extraction. It captures any data displayed on the screen.
Browser session hijacking: This method — present in stealers such as RacoonStealer — involves stealing cookies and session tokens from a browser’s memory. Cybercriminals can use this to impersonate the user’s online session, gaining unauthorized access to accounts without needing a username and password.
File harvesting: The malware searches through files and emails on the computer to gather information, which can include login credentials, images, sensitive documents, communications, and more.
Crypto wallet harvesters: Some Infostealer malware, such as LokiBot, can search for common crypto-wallet software and attempt to steal private keys. Once in the attacker’s possession, these keys can be used to transfer the victim’s cryptocurrency to attacker-controlled accounts.
Data exfiltration
The collected data is then transmitted to the attacker’s server. This can be done through:
HTTP/HTTPS requests: Sending the data to a web server controlled by the attacker — or via APIs to reputable file-sharing sites.
FTP transfers: Uploading the data to an FTP server.
Email: Sending the data via email to the attacker.
Where does infostealer data go?
The data collected by infostealers is often sold or traded in one of two places: a centralized marketplace or a decentralized marketplace.
Centralized marketplaces, such as the now defunct Genesis marketplace, provide a one-stop shop for infostealer data.
Decentralized options also exist, such as Telegram bots like the one pictured below. Here, criminals request what they need (credentials used on Lufthansa, for example), and the bot will respond with how many records exist. The attacker can then request those records, pay a price directly, and receive the logs.
A path for criminal activity
Cybercriminals can then use this stolen data for various malicious purposes, including:
Identity theft: Using personal information to impersonate the victim.
Financial fraud: Using financial information to make unauthorized transactions.
Phishing attacks: Using the stolen data to craft more convincing phishing emails.
Ransomware attacks: Using the stolen data to extort the victim.
Sextortion/blackmail: Gaining access to the user’s files can result in threats to expose their data.
Is infostealer data reliable?
While infostealers can collect a vast amount of data, the reliability of this data is not always guaranteed.
User mistakes
Users can make mistakes when entering data, which can lead to the inclusion of incorrect or irrelevant information. For example, a user might accidentally type a friend’s email address instead of their own when signing up for a service. This mistake can result in the infostealer collecting and transmitting the friend’s email address, potentially leading to the friend being targeted by the attacker instead.
Cybercriminals who test stolen passwords may have their own computers infected with infostealer malware.
When these compromised criminals test lists of stolen credentials, the infostealer captures this activity.
Much of this testing involves old, invalid credentials from previous data breaches found on dark web forums.
As a result, when someone sees their old password appearing in malware logs, they might incorrectly assume their computer is currently infected.
In reality, their information may have come from an old data breach where just one password was compromised, rather than from active malware on their system.
In short, it may just be a criminal testing old stolen passwords on their malware-infected computer that creates logs that make it look like many people have malware, when actually those people had their passwords leaked in the past.
Corrupted data
Infostealers can also collect data that is incomplete or corrupted.
For example, a keylogger might not capture all keystrokes, or a file scanner might miss certain types of files. This can lead to gaps in the collected data, making it less useful for the attacker.
How to protect yourself from infostealers
Here are some ways you can protect yourself right now.
Use a virus scanner to ensure your system is protected from malware.
Be careful of phishing, using tools like NetShield, which is built into ProtonVPN, to protect yourself from known malicious links; only download attachments from known contacts (and even then be vigilant).
Enable Dark Web Monitoring on your Proton account to detect and respond to threats quickly.
Monitor account accesses carefully and set up activity alerts with your bank.
A growing threat
Infostealers are a significant threat in the world of cybersecurity, capable of collecting a wide range of sensitive information from infected systems. Understanding how they work and the distribution of the data they collect is crucial for protecting against these threats.
However, it’s also important to recognize that infostealer data is not always reliable due to user mistakes, accidental infections, and data integrity issues. By staying informed and taking proactive security measures, individuals and organizations can better protect themselves from the dangers of infostealers.