Infostealers account for surge in identity-enabled attacks – BetaNews


Published on: 2025-03-18

Intelligence Report: Infostealers account for surge in identity-enabled attacks – BetaNews

1. BLUF (Bottom Line Up Front)

The recent surge in identity-enabled attacks is primarily driven by the rise of infostealer malware infections across Windows and macOS platforms. This trend poses significant risks to organizational security, as adversaries leverage compromised identities to access multiple systems. Strengthening identity management and implementing robust security measures are critical to mitigating these threats.

2. Detailed Analysis

The following structured analytic techniques have been applied for this analysis:

General Analysis

Infostealer malware, particularly the Lummac variant, has shown a marked increase in detections. These malware types operate under a malware-as-a-service model, allowing adversaries to purchase access on a subscription basis. The use of remote monitoring and management (RMM) tools, such as NetSupport Manager, facilitates command and control operations, enabling adversaries to deploy malicious payloads, including ransomware. The report highlights a significant rise in cloud-native identity-enabled attack techniques, underscoring the value adversaries place on compromised identities.

3. Implications and Strategic Risks

The proliferation of infostealer malware poses substantial risks to national security and economic stability. The ability of adversaries to compromise centralized identity systems can lead to unauthorized access to critical infrastructure and sensitive information. The exponential increase in malware targeting macOS, including threats like Atomic, Poseidon, and Banshee, further complicates the security landscape. The effectiveness of recent patches, such as those addressing Apple’s Gatekeeper bypass, demonstrates the importance of timely security updates in mitigating these risks.

4. Recommendations and Outlook

Recommendations:

  • Enhance identity access management (IAM) systems to prevent unauthorized access and detect anomalies.
  • Implement regular security audits and patch management to address vulnerabilities promptly.
  • Invest in advanced threat detection and response capabilities to identify and neutralize infostealer threats.

Outlook:

In the best-case scenario, organizations will adopt robust security measures, significantly reducing the impact of infostealer malware. In the worst-case scenario, failure to address these threats could lead to widespread identity compromise and systemic breaches. The most likely outcome involves a continued arms race between adversaries and security professionals, with incremental improvements in defense mechanisms.

5. Key Individuals and Entities

The report references Keith McCammon in relation to the analysis provided by Red Canary. The organization Red Canary is highlighted for its role in detecting and analyzing threats, including the significant rise in infostealer malware infections.

Infostealers account for surge in identity-enabled attacks - BetaNews - Image 1

Infostealers account for surge in identity-enabled attacks - BetaNews - Image 2

Infostealers account for surge in identity-enabled attacks - BetaNews - Image 3

Infostealers account for surge in identity-enabled attacks - BetaNews - Image 4