Infostealers Surge: Overtaking Ransomware in 2025

Infostealers are outpacing ransomware as the primary threat in 2025, with new tools like Storm enabling sophisticated credential theft and session hijacking.

Malware & RansomwareHIGHUpdated: Published: 📰 5 sources

Original Reporting

PTPentest Partners·Alex Wallace

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Infostealers are like sneaky thieves that quietly steal your personal information instead of locking your files. A new one called Storm is even smarter, stealing data without being caught, which makes it even more dangerous.

What Happened

In a shocking turn of events, infostealers have become the fastest growing malware category in 2025, surpassing ransomware. For years, ransomware has dominated headlines, but now infostealers are taking the spotlight. Reports from the first half of 2025 reveal a significant increase in their deployment, indicating a shift in cybercriminal tactics.

Infostealers are designed to blend seamlessly into normal user behavior, making them harder to detect. Unlike ransomware, which demands payment to unlock files, infostealers quietly siphon off sensitive information like passwords, credit card details, and personal data. This stealthy approach allows them to operate under the radar, posing a serious threat to individuals and organizations alike.

The Emergence of Storm

A new infostealer named Storm has emerged in early 2026, marking a significant evolution in credential theft. This sophisticated malware can hijack sessions, decrypt server-side data, and harvest browser credentials, session cookies, and cryptocurrency wallet information. Priced at under $1,000 a month, Storm allows cybercriminals to automate the process of restoring hijacked sessions without triggering alerts, making it a formidable tool in the hands of attackers.

Storm's design circumvents traditional endpoint security measures by shifting the decryption process from the victim's machine to the attacker's servers. This change not only reduces the chances of detection but also enables attackers to access sensitive data remotely, including saved passwords, Google account tokens, and browsing history. The implications for enterprise security are profound, as a single compromised browser can grant attackers authenticated access to critical SaaS platforms and internal tools.

Why Should You Care

Imagine your home being invaded, but instead of stealing your belongings, the intruder quietly copies your personal information. That’s what infostealers do. They can compromise your online accounts, leading to identity theft or financial loss. Your passwords and sensitive data are at risk, making it crucial to stay alert.

As more people work from home and rely on digital services, the potential for infostealers to exploit vulnerabilities increases. They can infiltrate your devices through malicious downloads or phishing emails, making it essential for you to be proactive about your cybersecurity. Protecting your personal information is more important than ever, as it’s the key to your digital life.

What's Being Done

Cybersecurity experts are on high alert as infostealers gain traction. Companies are ramping up their defenses and focusing on user education to combat this threat. Here are some immediate actions you can take:

  • Use strong, unique passwords for different accounts.
  • Enable two-factor authentication (2FA) wherever possible.
  • Be cautious with downloads and links in emails.

Experts are closely monitoring this trend, as the rise of infostealers, particularly with the introduction of sophisticated tools like Storm, could lead to more sophisticated attacks in the future. Staying informed and vigilant is your best defense against these evolving threats.

🔒 Pro Insight

The emergence of Storm highlights a worrying trend in infostealer development, as attackers adapt to circumvent traditional security measures. Organizations must enhance their defenses against these evolving threats.

📅 Story Timeline

Story broke by Pentest Partners

Covered by Help Net Security

Covered by Cyber Security News

Covered by Recorded Future Blog

Covered by BleepingComputer

Related Pings