17 min read

Top Infostealers in 2026: How They Work and How to Stop Them

Infostealers - What are they ?
Infostealers Target Credentials
Updated March 2026: Expanded MFA bypass section with Adversary-in-the-Middle (AitM) and the return of Lumma

Infostealers are malware purpose-built to harvest credentials, session cookies, and authentication tokens from compromised devices then sell that data directly into the ransomware supply chain.

Infostealer malware stole 1.8 billion credentials in the first half of 2025 alone. That is an 800% increase over the previous six months (Flashpoint, 2025). The stolen credentials came from 5.8 million infected devices.

54% of ransomware victims had their domain credentials appear in stealer log marketplaces before the attack hit (Verizon DBIR, 2025). The time between stolen credential and ransomware deployment? Sometimes under 48 hours.

Browser cookies are a common attack vector target. Your security programme should be hunting for infostealer infections to stay on top of this attack vector.

Get articles like this delivered to your inbox. Subscribe to CyberDesserts for practical security insights.


What Are Infostealers?

Infostealers are malware designed to harvest sensitive information from infected devices and transmit it to attackers. They operate quietly. Most victims never know they were compromised, that is the point.

What they steal:

  • Browser credentials (saved passwords, autofill data)
  • Session cookies and authentication tokens
  • Cryptocurrency wallet keys and seed phrases
  • VPN and RDP configurations
  • Email client data
  • Files matching specific patterns (documents, keys, configs)
  • System information (hostname, IP, installed software)

The business model has proven successful. Developers build the malware and sell subscriptions. Operators buy access, distribute the malware, and either use the stolen data themselves or sell it to others. The average cost for a malware-as-a-service infostealer subscription is $200 per month (KELA, 2025).

That low barrier to entry matters. You don't need technical sophistication to deploy infostealers. You need $200 and a distribution method.

The stolen data gets packaged into "stealer logs" and sold on underground markets or distributed through Telegram channels. Initial access brokers parse these logs for valuable enterprise credentials and sell verified network access to ransomware operators.

This supply chain is what makes infostealers dangerous. They are the first domino. A single infected workstation becomes a gateway to the corporate network, partner systems, and supply chain access.


How Infostealers Work

Infostealers need to reach victim machines, extract data, and exfiltrate it without detection. Each stage has evolved significantly.

From stolen cookies to ransomware sometimes within 48 hours
From stolen cookies to ransomware sometimes within 48 hour

Infection Vectors

Phishing remains dominant. IBM X-Force observed an 84% year-over-year increase in infostealers delivered via phishing emails in 2024. The messages typically carry malicious attachments or links to compromised sites.

Malvertising and trojanised software account for significant infections. Cracked software, fake updates, and poisoned search results all serve as distribution channels. If someone downloads pirated software or clicks a suspicious "download" button, they may be installing an infostealer alongside whatever they expected.

Fake CAPTCHA campaigns emerged as a major vector in 2024-2025. Attackers compromise legitimate websites and display fake verification pages. Victims are instructed to paste commands into their system's Run utility to "pass verification." Those commands download and execute malware directly in memory.

This technique, sometimes called ClickFix, exploits user trust in familiar verification patterns. It bypasses many traditional defences because users voluntarily execute the payload.

Data Extraction

Once running, infostealers systematically harvest data from predictable locations.

Browser data is the primary target. Infostealers access browser databases containing saved passwords, cookies, autofill data, and browsing history. Most browsers store this data in SQLite databases at known file paths.

Form grabbing intercepts data as users submit it. Rather than extracting stored credentials, the malware captures information in real-time as victims type.

Keylogging records keystrokes to capture credentials for sites where users don't save passwords.

File scanning searches for documents, private keys, cryptocurrency wallet files, and configuration files matching specified patterns. Think about where sensitive data might be stored.

MFA Bypass: Session Cookies and Adversary-in-the-Middle Attacks

This is the detail that changes defensive calculations.

Traditional MFA protects against password theft. If an attacker has your password but not your second factor, they cannot authenticate. Infostealers bypass this by stealing session cookies and authentication tokens.

When you log into a site with MFA, the site issues a session cookie. That cookie proves you already authenticated. Infostealers harvest these cookies. Attackers replay them to access accounts without needing the password or MFA token.

In 2024 alone, malware lifted over 17 billion browser cookies (aggregated industry data). Many of those cookies were valid authentication sessions for corporate services.

If you want to see how session cookie tokens are stolen check out the demo and lab

Adversary-in-the-Middle (AitM) phishing proxies take a different route to the same outcome. Rather than extracting cookies from the device after authentication, AitM attacks sit between the user and the legitimate login page in real time. The admin approves the MFA prompt on their phone. The attacker captures the resulting session token before it reaches its intended destination. Different delivery mechanism, same result: a valid authenticated session the attacker controls.

The March 2026 Stryker incident made the stakes concrete. Iran-linked threat group Handala used a compromised administrator account to access Microsoft Intune's management console and issue remote wipe commands across enrolled devices. No malware. No CVE. The attack surface was one privileged account and the admin dashboard, reachable from any browser.

For the full breakdown of how to harden privileged access against credential relay attacks, see Microsoft Intune Security: Hardening Privileged Access

This is why "enable MFA" is necessary but not sufficient. App-based MFA protects the authentication event. It does not protect the authenticated session from being stolen afterward and it does not stop a credential-relay proxy from capturing the session token in transit. FIDO2 passkeys and phishing-resistant authentication methods work differently: they bind the credential cryptographically to the login origin, so a relay attack simply fails.


The Stealer Log Economy

Stolen credentials become commodities in a structured underground economy.

Telegram Channels

Telegram has become the primary distribution platform for stealer logs. Operators run public channels to build reputation, offering free samples to demonstrate quality. Private channels require paid subscriptions ranging from $100 to $500 per month.

Some threat actors sell access to "live logs" where stolen data streams directly as infections occur. Speed matters in this market. Fresh credentials have higher value than stale ones.

Underground Marketplaces

Traditional cybercrime forums and marketplaces like Russian Market trade bulk credential dumps. Individual listings often bundle hundreds or thousands of stolen credentials.

The ecosystem segments by buyer type. Low-tier criminals buy bulk dumps for credential stuffing attacks. More sophisticated actors, including initial access brokers, parse logs for high-value enterprise credentials.

Initial Access Broker Pipeline

Initial access brokers specialise in converting raw credentials into verified network access. They identify corporate VPN logins, RDP credentials, and SaaS admin accounts within stealer logs. They validate access, then sell it to ransomware operators.

The window between stolen credential and ransomware deployment has compressed dramatically. Verizon's 2025 DBIR found the most common timing was just 2 days between credential appearing in a stealer log and ransomware incident.

If your credentials appear in a stealer marketplace on Monday, you may be dealing with ransomware by Wednesday.


Top Infostealer Families Active in 2026

Not all stealers are equal. As of early 2026, four families dominate active distribution: LummaC2, ACRStealer, StealC, and Vidar, based on AhnLab ASEC's February 2026 trend data. The ecosystem is moving fast. The rankings shifted significantly over a twelve-month period, and the families your EDR vendor documented last year may not reflect what is actually hitting organisations today.

Lumma Stealer

Lumma dominated the infostealer landscape and remained the most prevalent family by volume going into 2025. Its distinguishing features included direct syscall execution to evade EDR hooks, anti-sandbox evasion, and stealth exfiltration techniques. Lumma was notably associated with Scattered Spider operations and distributed at scale through fake CAPTCHA campaigns.

In May 2025, coordinated law enforcement action disrupted its infrastructure. Microsoft and partners sinkholed 394,000 infected Windows hosts over a two-month period, seizing approximately 2,300 command-and-control domains.

The disruption lasted weeks, not months. Trend Micro's telemetry shows Lumma command-and-control URLs grew from one in late May 2025 to more than 450 by mid-June. Bitdefender confirmed in February 2026 that Lumma is back at scale, having rapidly rebuilt its infrastructure and continuing to spread worldwide.

The post-disruption variant is stealthier than its predecessor. Lumma now relies on CastleLoader, a loader that executes entirely in memory and leaves minimal traces on disk, making it significantly harder for traditional security solutions to identify. The ClickFix delivery method remains active: victims receive fake verification or error pages instructing them to paste commands into the Windows Run dialog, which loads Lumma directly into memory without writing files to disk.

The speed of this recovery matters defensively. Law enforcement disruption should not be interpreted as an ongoing reduction in risk. Lumma is operating again, with better evasion and the same affiliate model that made it the dominant family in the first place.

ACRStealer

ACRStealer is one of the top three distributed infostealers globally as of early 2026, according to AhnLab ASEC's January and February 2026 trend reports. It has risen to prominence through SEO poisoning campaigns: malware distribution posts are placed on legitimate sites and forums to appear prominently in search results, driving victims to download pages disguised as cracks and keygens.

The malware has also been distributed via a new Inno Setup downloader campaign that uses PowerShell to fetch and execute multiple additional payloads alongside ACRStealer, including proxyware and Tor proxy components.

ACRStealer updated its encryption in late January 2026, replacing a hardcoded AES key with ECDH key exchange and ChaCha20-Poly1305 authenticated encryption. This is a meaningful technical upgrade: it complicates both detection and post-compromise analysis of captured C2 traffic. Security teams using older detection signatures built around ACRStealer's previous communication pattern should treat those as stale.

StealC

StealC ranks consistently among the top three globally by infection volume. Its developers prioritise stealth over capability breadth.

Version 2, released in March 2025, added command-and-control encryption with RC4 and updated payload delivery options including MSI packages and PowerShell. These changes made StealC more evasive and adaptable to environments with active security monitoring.

The design philosophy is to generate less noise than competitors. In environments where EDR is deployed, StealC's lower alerting footprint gives it a meaningful dwell time advantage over noisier families.

Vidar

Vidar remains an active top-tier family, though the framing around it has shifted. Earlier analysis positioned Vidar as the primary Lumma replacement following the May 2025 disruption. With Lumma's return to full operational capacity, Vidar is now competing rather than filling a vacuum.

Vidar's 2025 codebase overhaul rewrote the malware for efficiency and stealth. It targets personal information, browser data, and cryptocurrency wallet details. The family uses social media platforms including Telegram and Mastodon for command-and-control infrastructure, a technique that helps traffic blend into legitimate outbound connections.

Some samples contain null bytes to inflate file size and evade antivirus detection. Vidar has also implemented secondary payload downloading capabilities, effectively functioning as a loader for additional malware stages. This convergence trend; infostealers shipping with loader or backdoor functionality is accelerating across the ecosystem, not just in Vidar.

AMOS (Atomic macOS Stealer)

AMOS represents the expansion of infostealers beyond Windows, and 2025 to 2026 data confirms this is no longer an emerging concern. The latest versions include persistent backdoor capability that survives system reboots. Distribution methods include fake applications, cloned Homebrew installers, and since late 2025, ClickFix-style prompts combined with malicious DMG installers targeting macOS users directly.

Microsoft Defender Experts noted a clear increase in macOS-targeted infostealer campaigns using these methods, with underground market discussion about macOS stealers peaking through 2025. AMOS bypasses Gatekeeper protections and has been active in over 120 countries.

The "Macs don't get malware" assumption has always been dubious. It is now actively dangerous. If your organisation has significant macOS deployment among developers, executives, or remote workers, these users represent a high-value target profile for AMOS specifically: they tend to hold SSH keys, cloud credentials, and access to development infrastructure.

Notable Others

Several families sit outside the current top four but warrant a place on your radar either because their logs are still being actively weaponised, or because their entry price puts them within reach of almost any threat actor.

RedLine dominated infections from 2020 to 2023, responsible for an estimated 51% of all infostealer activity at its peak. Operation Magnus disrupted its infrastructure and charged its developer in October 2024. Active distribution has fallen, but the practitioner point is this: RedLine logs from campaigns years ago are still being tested against live accounts today. Disrupted infrastructure does not mean expired data.

Raccoon Stealer has survived multiple law enforcement actions since 2019, including the arrest and guilty plea of its primary operator in 2024. Associates relaunched V2 within weeks, adding fileless infection that executes entirely from memory. Its pattern of absorbing disruption and continuing is a useful reminder that MaaS operations do not depend on a single point of failure.

RisePro appeared consistently among the five most advertised infostealers on dark web forums throughout 2024 (IBM X-Force). Low subscription cost and broad targeting make it a volume threat worth including in detection coverage even without a high-profile breach attribution.

DarkCloud is the lowest barrier-to-entry family currently active, subscription tiers starting at $30 via Telegram. Flashpoint analysis from February 2026 found it targeting every major browser, Outlook, Thunderbird, VPN clients, and file transfer tools. Written in Visual Basic 6.0, which produces significantly fewer VirusTotal detections than modern languages. The price point is the threat: effective infostealer capability within reach of actors with minimal budget or skill.

The family name matters less than the technique. Browser data access from an unexpected process, PowerShell spawned from a user-initiated action, outbound connections to newly registered domains, those behaviours appear across every family listed here and plenty that are not.


The connection between infostealers and major incidents is not theoretical.

Airline: VPN Credential to Ransomware

A European airline breach demonstrated the full attack chain. Attackers obtained VPN credentials through infostealer malware. Those credentials provided initial access to the corporate network.

From that foothold, attackers escalated privileges and deployed ransomware. The entire progression from stolen credential to ransomware detonation followed the pattern security teams see repeatedly.

What was missing: MFA on VPN access and strict network access controls. A single stolen credential should not provide unfettered network access.

Financial Services BEC via Raccoon Stealer

An FBI advisory documented a multimillion-dollar business email compromise traced to Raccoon Stealer infections. Attackers used stolen browser cookies to take over email accounts without triggering authentication alerts.

With email access, attackers monitored communications and executed wire fraud. The organisation discovered the compromise only after funds were gone.

What was missing: Browser hardening policies, session management, and monitoring for credential exposure in underground markets.

The Supply Chain Multiplier

Many stolen credentials provide third-party or supply chain access. A single infected workstation at a managed service provider becomes a gateway to every client network they manage.

This is what transforms infostealers from nuisance malware into strategic threats. The compromised credentials may not belong to high-value targets directly. They belong to someone with access to high-value targets.

For more on supply chain risk, see Gartner's 2025 Supply Chain Prediction: A Retrospective.


How to Detect Infostealer Activity

Detection requires visibility at multiple layers. No single control catches everything.

Network-Level Indicators

Suspicious outbound connections. Infostealers communicate with command and control infrastructure. Watch for connections to unclassified domains, particularly POST requests with encoded payloads.

DNS anomalies. Some stealers use DNS for C2 communication or domain generation algorithms. Unusual query patterns may indicate infection.

Data volume anomalies. Credential exfiltration produces smaller data transfers than traditional data theft, but patterns may still be detectable.

Endpoint Behavioural Indicators

Process hollowing. Lumma and other advanced stealers use process hollowing to inject malicious code into legitimate processes. Monitor for this technique.

Direct syscall patterns. Lumma's signature behaviour includes direct syscalls to evade EDR hooks. EDR tools increasingly detect this, but coverage varies.

Browser data access. Legitimate processes rarely access browser credential databases directly. Alert on unusual processes reading SQLite databases from browser profile directories.

Unusual DLL activity. Watch for DLLs loaded from unexpected locations or with suspicious characteristics.

Check the section below on technical controls for more detailed info on EDR solutions.

Threat Hunting Approaches

If you operate a SIEM, hunt for these patterns:

  • Processes accessing browser profile directories that are not the browser itself
  • Outbound connections to recently registered domains
  • PowerShell or cmd.exe spawned from Office applications
  • Credential store access outside normal user workflows

This could prove useful as an exercise combined with the ELK Stack Security Monitoring Tutorial.

For detection rule development, Florian Roth's work on YARA rules and Sigma rules provides excellent starting points. His detection methodology has become a community standard.

Credential Monitoring

Proactively search for your corporate domains in stealer log marketplaces. Several threat intelligence services provide this capability. Finding your credentials in a marketplace before attackers use them gives you a window to respond.

The window is small. Days, not weeks.


How to Protect Against Infostealers

Protection requires technical controls, process discipline, and user awareness. No single measure is sufficient.

Technical Controls

Disable browser password storage for sensitive applications. Corporate SSO, financial systems, and admin consoles should not have credentials saved in browsers. This reduces what infostealers can harvest.

Deploy EDR with behavioural detection. Signature-based antivirus misses novel variants. Behavioural detection catches techniques even when specific malware is unknown. Not all EDR products detect infostealers equally. Evaluate coverage for stealer-specific behaviours, but make sure this is not your only defence. Having spent many years working for an EDR vendor, I can tell you first hand even with a good solution defence in depth is still crucial as detection is not guaranteed.

Enforce MFA everywhere. Yes, session cookies bypass MFA. Deploy it anyway. MFA still protects against password-only attacks and raises the bar for attackers. It is necessary, not sufficient.

Implement Device Bound Session Credentials where available. Chrome introduced Device Bound Session Credentials (DBSC) to prevent session cookie replay attacks. DBSC ties authentication sessions to specific devices using TPM-backed cryptographic keys. When a session starts, Chrome generates a public/private key pair stored securely on the device. The server can verify proof-of-possession throughout the session, making stolen cookies useless on other devices.

Chrome's second Origin Trial runs October 2025 to February 2026. Microsoft Edge and identity providers like Okta have expressed interest in the standard. This directly addresses the session hijacking problem, though adoption is still early and currently limited to Windows devices with TPM hardware.

Reduce local admin rights. Infostealers running with admin privileges can access more data and evade more defences. Principle of least privilege limits blast radius.

Browser hardening. Disable unnecessary extensions. Consider browser isolation for high-risk users. Evaluate enterprise browsers with enhanced security controls.

Process Controls

Credential exposure monitoring. Subscribe to threat intelligence services that monitor underground markets for your domains. When your credentials appear, you need to know immediately. A good threat intel feed will give you detailed information, sometimes including the target IP and source of the credential exposure.

Rapid response playbooks. Define what happens when credentials appear in stealer logs. Password resets, session invalidation, endpoint investigation. The 48-hour window means you cannot wait for the next change control meeting.

Regular session invalidation. Periodically force re-authentication for sensitive systems. This limits the useful lifetime of stolen session cookies.

Third-party access reviews. Understand which partners and vendors have access to your systems. Their infections become your problem.

Human Factors

Phishing awareness that sticks. 84% of infostealer delivery is phishing. Generic annual training is not enough. Role-specific scenarios, simulated campaigns, and consequences for repeated failures.

Cracked software policies. Make it clear that installing pirated software on corporate devices is a firing offense. Make it equally clear that you will provide legitimate tools employees need.

Personal device policies. 35% of infostealer infections occur on personal devices (KELA, 2025). Remote work means personal machines often contain corporate credentials. Define acceptable use, enforce MDM where possible, and consider separate browser profiles for work. My advice: avoid managing personal devices if you can. It's another headache and significantly expands your attack surface.


The AI Factor

AI is changing both attack delivery and malware development.

AI-generated phishing. Over 82% of phishing emails now show evidence of AI generation (industry estimates, 2025). AI-crafted lures are more convincing, more personalised, and produced at scale.

Polymorphic code. Malware authors use AI to generate code variants that evade signature detection. The cat-and-mouse game between malware and antivirus accelerates.

This does not fundamentally change defensive strategy. It raises the bar. Phishing awareness must account for more sophisticated social engineering. Detection must rely more heavily on behaviour than signatures. Let's see how this evolves in 2026. It's likely every layer of your defensive strategies will be tested when it comes to AI.

Summary

Infostealers are the first stage in enterprise compromises. Stolen browser cookies become the initial path for ransomware deployment or business email compromise.

In numbers: 1.8 billion credentials stolen in six months. 54% of ransomware victims had credentials exposed beforehand. A 48-hour window between credential theft and ransomware.

This should help take your defensive strategies to the next level.

Defensive priorities:

  • Deploy EDR with behavioural detection for stealer techniques
  • Monitor for credential exposure in underground markets
  • Build rapid response capability for the 48-hour window
  • Disable browser password storage for sensitive systems
  • Train users on phishing with role-specific scenarios
  • Address personal device risk in your security programme

Infostealers may look like small-scale threats. They warrant enterprise-grade defences. Treat them as strategic risks and position your organisation as a hardened target.


Updated March 2026

Frequently Asked Questions

What is an infostealer?

An infostealer is malware designed to secretly harvest sensitive information from infected devices. They target credentials, session cookies, cryptocurrency wallets, and personal files. Most operate as malware-as-a-service, available for around $200 per month.

How do infostealers steal passwords?

Infostealers extract passwords from browser databases, intercept data submitted in web forms (form grabbing), and record keystrokes (keylogging). They also steal session cookies, which allow attackers to access accounts without needing the password at all.

What is the most common infostealer?

As of early 2026, LummaC2, ACRStealer, StealC, and Vidar are the most actively distributed families. Lumma was disrupted by law enforcement in May 2025 but recovered within weeks and is back at scale. RedLine has declined following Operation Magnus in October 2024, though its logs continue circulating in underground markets and remain a live credential threat.

Can MFA stop infostealers?

Not entirely. MFA protects the authentication event, but infostealers steal session cookies that represent already-authenticated sessions. Attackers replay these cookies to access accounts without needing passwords or MFA codes. FIDO2 passkeys offer stronger protection against this technique.

How do I know if I'm infected with an infostealer?

Most infections produce no obvious symptoms. Detection relies on EDR alerts for suspicious browser data access, monitoring for credentials appearing in dark web markets, and network analysis for unusual outbound connections. If you suspect infection, investigate immediately. Do not wait for confirmation.

What should I do if my credentials appear in a stealer log?

Reset passwords immediately for affected accounts. Invalidate active sessions. Investigate the source endpoint for malware. Review access logs for suspicious activity. Assume attackers have already attempted to use the credentials.

What is an Adversary-in-the-Middle (AitM) attack in the context of infostealers?

AitM attacks and infostealers both bypass MFA by stealing authenticated session tokens, but through different methods. Infostealers harvest browser cookies already stored on the device. AitM phishing proxies intercept session tokens in transit, before they reach the legitimate site. Both result in the attacker holding a valid session that MFA has already cleared.


This analysis gets updated as the threat landscape shifts. Subscribers receive notifications when major changes happen, plus weekly practical security content.


Last updated: January 2026

References and Sources

  1. Flashpoint. (2025). Global Threat Intelligence Index: 2025 Midyear Edition. 1.8 billion credentials stolen from 5.8 million devices in H1 2025, 800% increase.
  2. Verizon. (2025). 2025 Data Breach Investigations Report. 54% of ransomware victims had domains in stealer logs. 88% of web app attacks involve stolen credentials.
  3. KELA. (2025). Infostealer Epidemic Report. 3.9 billion credentials compromised, 4.3 million devices infected in 2024. Top three families: Lumma, StealC, RedLine.
  4. IBM X-Force. (2025). Threat Intelligence Index. 84% YoY increase in infostealers via phishing.
  5. Microsoft. (2025). Lumma Stealer Disruption. 394,000 infections sinkholed in coordinated action.
  6. CISA. (2025). Alert AA25-141b. Threat actors deploy LummaC2 malware advisory.
  7. Google Chrome. (2025). Device Bound Session Credentials. Origin Trial documentation.