Banking Passwords Stolen from Australians

Nikita Shekhawat
Nikita Shekhawat

Junior SEO Specialist

 
April 29, 2025 4 min read

More than 31,000 passwords belonging to Australian customers of the Big Four banks have been shared among cybercriminals online, often at no cost. An investigation by cyber intelligence researchers revealed that credentials from at least 14,000 Commbank customers, 7,000 ANZ customers, 5,000 NAB customers, and 4,000 Westpac customers are available through platforms like Telegram and the dark web. This follows recent attacks targeting Australian superannuation funds where hackers exploited leaked passwords to access members' accounts. A screenshot of a website selling stolen data, an ANZ website is highlighted.

The Australian firm Dvuln, which discovered this issue, indicated that the passwords were stolen directly from users' devices infected with infostealer malware. Jamie O'Reilly, Dvuln's founder, clarified, "This is not a vulnerability in the banks; these are customer devices that have been infected." Infostealer malware is designed to infect devices, collect valuable data, and send it to criminals. This type of malware primarily targets Windows computers and can capture not only passwords but also credit card information, cryptocurrency wallets, and browser data. A graphic depicting a computer infected with malware for a story about stolen banking passwords.

Risks and Consequences of Infostealer Malware

Experts warn that exposed passwords pose a significant risk of theft. Leonid Rozenberg, a specialist in infostealer malware at Hudson Rock, stated, "Threat actors can use the bank account to link to some kind of payment system, to transfer funds, or for money laundering." The average victim of infostealer malware has between 200-300 stored account details, which could include various financial and e-commerce accounts. A screenshot of a website selling stolen data, the search tab shows 17,000 files mention Australia.

Despite the rise in malware infections, there has been a surprising lack of publicized theft and fraud linked to this issue. O'Reilly explained that many fraud cases may go unreported due to the difficulty in tracing back to specific malware infections. He emphasized that "A lot of this crime, on an individual level, goes unreported."

Infostealer Malware: A Growing Threat

The usage of infostealers has surged dramatically, with Hudson Rock reporting over 58,000 infected devices in Australia and more than 31 million globally. This increase has resulted in a significant drop in the price of stolen passwords. O'Reilly monitors about 100 Telegram groups that trade data obtained through infostealers, many of which offer subscriptions for ongoing access to stolen credentials. A Telegram channel advertising

For as little as $US400, criminals can gain access to hundreds of thousands of stolen credentials monthly. Many groups even provide free access to entice new customers, reflecting the abundance of stolen data available.

Protecting Yourself from Infostealer Malware

To safeguard against infostealer malware, it's essential to adopt proactive measures. Changing your password is ineffective if your device remains infected. The best approach is to change your passwords from a secure device. Multi-factor authentication (MFA) can provide additional security; however, attackers may also sell access tokens alongside stolen passwords. Key strategies for protection include:

  1. Update Software Regularly: Keeping both your operating system and antivirus software updated is critical. Research indicates that many infected devices have outdated security measures in place.
  2. Beware of Shared Devices: If sensitive information is stored on a family computer, ensure that only trusted users access it. Infections can spread through various means, including phishing attacks and downloading unverified software.
  3. Educate Yourself on Malware Risks: Understanding how malware operates can help you avoid common pitfalls, such as downloading from dubious websites or clicking on unknown links.

Cybersecurity Tips for Financial Accounts

Proactive measures are crucial for securing financial accounts. Cybercriminals are constantly seeking opportunities to access personal finances. It's vital to implement several strategies to mitigate risks:

  1. Enable Multi-Factor Authentication (MFA): This adds an extra layer of security by requiring verification through multiple methods.
  2. Use Strong, Unique Passwords: Employ long, complex passwords for each account. Consider using a password manager to keep track of them.
  3. Be Wary of Scams: Always verify the source of communications before responding or clicking on links.
  4. Monitor Accounts Regularly: Frequently check for unusual transactions and set up alerts for large withdrawals.
  5. Secure Your Devices: Ensure devices are protected with strong locks and that software updates are enabled.

For marketers in the cybersecurity space, leveraging tools like GrackerAI can streamline content creation and enhance strategic marketing efforts. GrackerAI helps organizations identify emerging trends, monitor threats, and produce relevant content that resonates with cybersecurity professionals. Explore GrackerAI's services at https://gracker.ai to elevate your cybersecurity marketing initiatives.

Latest Cybersecurity Trends & Breaking News

TufinAI: Revolutionizing Network Security 'Slopsquatting' and Other New GenAI Cybersecurity Threats

Nikita Shekhawat
Nikita Shekhawat

Junior SEO Specialist

 

Nikita Shekhawat is a junior SEO specialist supporting off-page SEO and authority-building initiatives. Her work includes outreach, guest collaborations, and contextual link acquisition across technology and SaaS-focused publications. At Gracker, she contributes to building consistent, policy-aligned backlink strategies that support sustainable search visibility.

Related Articles

The Complete Tech Stack for Programmatic SEO: Tools
programmatic seo tools

The Complete Tech Stack for Programmatic SEO: Tools

Discover the essential tools for programmatic SEO. From data scraping to automated CMS setups, learn the tech stack used by growth hackers to scale b2b saas traffic.

By Ankit Agarwal February 4, 2026 7 min read
common.read_full_article
Top AEO Agencies for Cybersecurity Companies in 2026
AEO agencies

Top AEO Agencies for Cybersecurity Companies in 2026

Discover the leading AEO and GEO agencies for cybersecurity brands in 2026. Learn how to optimize for AI search engines and maintain visibility in LLM responses.

By Ankit Agarwal February 4, 2026 7 min read
common.read_full_article
Building a Moat with Content: Why Some Security Companies Can't Be Copied
marketing strategy

Building a Moat with Content: Why Some Security Companies Can't Be Copied

Discover how security companies use pSEO and GEO to build uncopyable content moats. Learn growth hacking strategies for B2B SaaS in the age of AI assistants.

By David Brown February 4, 2026 6 min read
common.read_full_article
Quality Assurance for Programmatic Content: Testing at Scale
programmatic seo

Quality Assurance for Programmatic Content: Testing at Scale

Master quality assurance for programmatic content. Learn how to test pSEO and AI-generated content at scale for B2B SaaS growth, AEO, and GEO success.

By Ankit Agarwal February 4, 2026 11 min read
common.read_full_article