Threat Intel

Off the back of Operation Endgame (great work everyone involved!) we have some more data to show what many of us in the cyber industry know but isn’t so easy to show people. So I figured this might help explain part of how and why infostealers are a problem but also I look at how we might be able to use this takedown to help feed into a risk modelling process.

Rhadamanthys take down notice

What is an info stealer?

Malware that is installed/executed on systems that steals information! I know, right but let’s think about what is stolen:

  • Usernames/Emails
  • Passwords
  • Bitcoin Wallet IDs

Now stealers get deployed through a range of techniques:

  • Backdoored legit software via malvertising (malicious advertising e.g. google adverts)
  • Phishing emails

Who gets hit?

Now this is harder normally to quantify, each antimalware company gets a slice of a view of what they see, the browsers see some things through google safe browse API and Edge APIs etc. The EDR companies see things etc.

But with this latest takedown and arrest we have a dataset in the public. So I’ve started to do a small cleanup activity and then have started to look at how this looks at from a contextual pov.

What gets hit?

Personal Devices? Corporate Devices? It really depends. I have seen a mix personally but honestly we don’t know the full picture. I’d guess more home/personal PCs than corporate ones, feel free to send me data analysis if that’s a wrong assumption.

Dataset Analysis

In the dataset the count of domains was > 330K domains!

In the collection there are over 44 Million set of credentials!

Now a key thing to note here, you might have in someone’s home PC, a set of credentials like:

name @ workplace dot domain

A member of staff might have signed up for amazon using a work email, or getting their grocery shopping with a work account. So a corporate email existing in an info stealer log != the corporate credentials. We should not however discount, credential re-use etc.

I did some analysis on a specific sector and used OSINT to estimate staffing levels:

Credential % vs Estimated Employee Count
2.000%
1.857%
1.160%
1.075%
1.000%
0.800%
0.656%
0.600%
0.600%
0.533%
0.514%
0.500%
0.333%
0.309%
0.280%
0.273%
0.229%
0.140%
0.133%
0.133%
0.133%
0.125%
0.120%
0.111%
0.100%
0.097%
0.080%
0.079%
0.067%
0.067%
0.060%
0.057%
0.050%
0.045%
0.040%
0.033%
0.030%
0.030%
0.029%
0.024%
0.023%
0.017%
0.015%
0.013%
0.005%
Email/Password Combo Percent / Estimated Staff Count

The range is from 0.005% to 2% and if we look at the mean (average) we get 0.324%

For another slice I get this (different vertical):

Percent
1.257%
0.800%
0.650%
0.588%
0.533%
0.527%
0.500%
0.400%
0.395%
0.367%
0.350%
0.338%
0.267%
0.229%
0.225%
0.225%
0.222%
0.211%
0.150%
0.150%
0.135%
0.120%
0.117%
0.113%
0.111%
0.110%
0.100%
0.090%
0.080%
0.080%
0.070%
0.067%
0.067%
0.057%
0.057%
0.057%
0.054%
0.053%
0.050%
0.040%
0.033%
0.029%
0.025%
0.020%
0.018%
0.017%
0.013%
0.013%
0.013%
0.010%
0.009%
0.003%

That’s a range of 0.003% through to 1.25% with an average of 0.20%

Broadly speaking what we are seeing from the one stealer family, <2% based on an our sampling. From a risk point of view that’s not nothing.

Using the UK National Risk register matrices:

That sit’s into Category 1 or 2 Likelihood.

So on the PHIA yardstick that fits into ‘Remote Chance 0-5%’. Clearly assessing impact here is outside of the scope of this blog. Impacts could range from almost 0 to significant, depending upon a large range of variables.

https://assets.publishing.service.gov.uk/media/67b5f85732b2aab18314bbe4/National_Risk_Register_2025.pdf

Summary

Now clearly info stealer are a problem but also it’s clear that an email + credentials != corporate credentials (in all cases). You simply need to be inside the org or have validated the creds against a corporate auth provider… and well we aren’t criminals so we don’t do that!

It’s key that organisations implement controls to both protect, detect and respond. What does that look like in practise?

  • Contextual/Conditional Access
  • Breach monitoring
  • Multi-Factor Authentication
  • Risky Sign in detection and response
  • EDR
  • Antimalware
  • Web Content Filtering
  • Protective DNS

Identity threats are real, ensuring you have robust controls in this space makes sleeping much simpler! A no incident r3b00t life is a happy r3b00t life!

Remember, it’s easy to see a brand name etc. and jump to conclusions, hopefully this helps people understand about info stealers, the complexities of understanding the data and gives a view of prevalence (at least for this particular family). The details, as always… matter!