Over 330 Million Credentials Compromised by Infostealers

February 21, 2025 3 min read

Infostealers have become a significant threat, with over 330 million compromised credentials connected to malware activities. According to a report by Kela, these credentials were found linked to infostealer activity on at least 4.3 million machines. Access to sensitive corporate services such as cloud solutions, content management systems, email, and user authentication is at risk. Infostealer Activity Image courtesy of Infostealers The findings from Kela's The State of Cybercrime 2024 report highlight a slight increase in the number of compromised credentials from the previous year. The report identifies that the top three infostealer strains – Lumma, StealC, and RedLine – are responsible for over 75% of the infected machines. Notably, high-profile operations targeting these strains have shown the capability of law enforcement to dismantle parts of the infostealer supply chain. Additional information can be found in the following articles:

Hundreds of US Military and Defense Credentials Stolen

Research by Hudson Rock has revealed that credentials for sensitive corporate and military networks, including those of Lockheed Martin, Boeing, and Honeywell, have been compromised. These credentials are available for purchase on cybercrime marketplaces, offering access to corporate email, VPN accounts, and military training platforms. For as little as $10 per log, threat actors can buy access to these sensitive systems. Hudson Rock's findings indicate that even organizations that are not directly impacted by infostealers can face risks if their partners or suppliers have been compromised. The report emphasizes the potential national security risks posed by these breaches, as the data stolen could allow adversaries to infiltrate critical networks. Affected users are advised to rotate their passwords immediately and conduct forensic investigations to assess the extent of the breaches. For further reading, consider these sources:

Implications for Cybersecurity Marketing

With the rise of infostealer activities and credential theft, organizations must enhance their cybersecurity measures and stay informed about emerging threats. GrackerAI, an AI-powered cybersecurity marketing platform, helps organizations transform security news into strategic content opportunities. By automating insight generation from industry developments, GrackerAI enables marketing teams to identify trends, monitor threats, and produce relevant content for cybersecurity professionals. Companies need to adapt their marketing strategies to address the escalating risks associated with infostealers. GrackerAI provides a solution for creating timely, targeted marketing materials, positioning organizations to effectively engage with their audience and communicate critical information. Explore GrackerAI’s services or contact us to learn how we can assist in enhancing your cybersecurity marketing efforts. Visit GrackerAI.

Related Articles

The Question Hub Strategy: How B2B SaaS Companies Capture AI Search Traffic

Learn how B2B SaaS companies use Question Hub strategy to capture ChatGPT, Claude & Perplexity traffic. 5-step process with real case studies & results.

By Deepak Gupta July 23, 2025 3 min read
Read full article

Google Adds Comparison Mode for Real-Time SEO Checks

Use Google’s new Search Console comparison mode for hourly SEO audits. Perfect for SaaS & cybersecurity marketers tracking real-time changes.

By Ankit Agarwal July 18, 2025 3 min read
Read full article

2025 Programmatic SEO Playbook: AI, Real-Time Data, and Market Domination

Master 2025 programmatic SEO with AI-powered content, real-time data integration, and dynamic optimization. Includes implementation guide and competitive advantages.

By Deepak Gupta July 6, 2025 10 min read
Read full article

Quality at Scale: How AI Solves Programmatic SEO's Biggest Challenge

Discover how AI transforms thin programmatic content into high-quality pages that survive Google's 2025 updates. Includes quality metrics and implementation guide.

By Deepak Gupta July 6, 2025 13 min read
Read full article