53 Percent of Devices Infected with Data-stealing Malware are Related to Corporates

The share of corporate devices compromised with data-stealing malware has increased by one-third since 2020, according to Kaspersky Digital Footprint Intelligence. 21 percent of employees whose devices were infected ran the offending malware repeatedly. In response to the escalating threat of infostealers targeting corporate users, the Kaspersky Digital Footprint Intelligence team is raising awareness of the issue and offering strategies to mitigate the associated risks.

Kaspersky has revealed a concerning trend: corporate devices are facing a growing threat from infostealers. According to data extracted from data-stealing malware log files available on the dark web, the share of corporate users compromised with such malware has increased by 34 percentage points since 2020.

In 2023, experts concluded that every second device (53%) infected with credential-stealing malware was corporate, based on data indicating that the biggest share of infostealer infections was found in the Windows 10 Enterprise version. The diagram below illustrates the distribution of infections among various editions of Windows 10, spanning from 2020 to 2023.

Distribution of infections across affected Windows 10 versions, 2020–2023
After infecting a single device, cybercriminals can gain access to all accounts – both personal and corporate. According to Kaspersky statistics, one log file contains credentials with a corporate email as a login to an average of 1.85 corporate web applications, including webmail applications, customer data processing systems, internal portals, and more.

We were curious to know if corporate users re-open malware, thereby allowing cybercriminals to access data collected from a previously infected device without needing to infect it again,” comments Sergey Shcherbel, expert at Kaspersky Digital Footprint Intelligence. “To investigate this, we examined a sample of log files containing data likely related to 50 banking organisations across various regions. We found 21 percent of employees reopened the malware again, and 35 percent of these reinfections occurred more than three days after the initial infection. This may indicate several underlying issues, including insufficient employee awareness, ineffective incident detection and response measures, a belief that changing the password is sufficient if the account has been compromised, and a reluctance to investigate the incident.

To minimise the impact of a data leak caused by infostealer activity, we suggest you follow these steps:

Change passwords for compromised accounts immediately and monitor them for suspicious activity;

Advise potentially infected users to run antivirus scans on all devices and remove any malware;

Monitor dark web markets for compromised accounts to detect compromised accounts before they affect the cybersecurity of customers or employees. A detailed guide on setting up monitoring can be found here;

Utilize Kaspersky Digital Footprint Intelligence to detect potential threats and take prompt action.

For enhanced protection against infostealer infections, develop an employee security awareness program, and offer regular training and assessments.

Related posts

Advancing IT Support to the Next Era: TeamViewer Integrates Microsoft Teams into its AI-Powered Insights

“Automation Anywhere: Pioneering the Transformation of Enterprise Business Processes in India”

Accenture Expands Generative AI-Powered Cybersecurity Services and Capabilities to Accelerate Clients’ Resilience and Reinvention

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More